|
|
Books > Computing & IT > Computer hardware & operating systems > General
Exa-scale computing needs to re-examine the existing hardware
platform that can support intensive data-oriented computing. Since
the main bottleneck is from memory, we aim to develop an
energy-efficient in-memory computing platform in this book. First,
the models of spin-transfer torque magnetic tunnel junction and
racetrack memory are presented. Next, we show that the spintronics
could be a candidate for future data-oriented computing for
storage, logic, and interconnect. As a result, by utilizing
spintronics, in-memory-based computing has been applied for data
encryption and machine learning. The implementations of in-memory
AES, Simon cipher, as well as interconnect are explained in
details. In addition, in-memory-based machine learning and face
recognition are also illustrated in this book.
Learn how to deploy Raspberry Pi computers in a classroom or lab
situation and how to navigate the hardware and software choices you
face. Deploying Raspberry Pi in the Classroom equips you with the
skills and knowledge to plan and execute a deployment of Raspberry
Pi computers in the classroom. Teachers and IT administrators at
schools will see how to set up the hardware and software swiftly on
your own or with the help of your students. Step-by-step
instructions and practical examples walk you through building your
Raspberry Pi workstations and your network, managing the computers
and the network, and troubleshooting any problems that arise. This
book offers several points to involve your students through
hands-on activities. These activities are designed to benefit your
beginner and older or more able students alike. Make Deploying
Raspberry Pi in the Classroom a part of you instructional library
today. What you will learn Put an easily-manageable computer on
each desk for students to learn Internet use and essential office
software skills Image, configure, and plan a classroom deployment
of Raspberry Pi computers Manage your classroom Raspberry Pi
computers and keeping them up and running smoothly and efficiently
Who this book is for Primary audience would be teachers and IT
administrators at schools or colleges. It will also appeal to
administrators at social clubs or organizations that provide less
formal tuition or simply provide Internet access.
This book constitutes the refereed proceedings of the 23rd
International Colloquium on Structural Information and
Communication Complexity, SIROCCO 2016, held in Helsinki, Finland
in July 2016. The 25 full papers presented were carefully reviewed
and selected from 50 submissions. The papers are organized around
the following topics: message passing; shared memory; mobile agent;
data dissemination and routing.
Pull back the curtain on making fun and innovative costumes and
accessories incorporating technologies like low-cost
microprocessors, sensors and programmable LEDs. Fashion tech can
require skills in design, pattern-making, sewing, electronics, and
maybe 3D printing. Besides the tech skills, making a good costume
or accessory also requires knowledge of the intangibles of what
makes a good costume. This book is a collaboration between two
technologists and a veteran teacher, costumer, and choreographer.
Regardless of whether you are coming at this from the theater
costuming, sewing, or electronics side, the authors will help you
get started with the other skills you need. More than just a book
of projects (although it has those too), Practical Fashion Tech
teaches why things are done a certain way to impart the authors'
collective wealth of experience. Whether you need a book for a
wearable tech class or you just want to get started making
fantastic costumes and wearables on your own, Practical Fashion
Tech will get you there. What you will learn: The fundamentals of
both the sewing and the technology aspects of wearable tech for
fashion How to make a memorable costume that reacts to its wearer
or environment Ideas for using this book as a textbook Who this is
for: Electronics enthusiasts, hipsters, costume designers,
teachers, and students who want to learn how to make fashion or
cosplay wearables. Cosplay fans wanting to incorporate sensors and
more into their costumes.
In the last fifty years the world has been completely transformed
through the use of IT. We have now reached a new inflection point.
This book presents, for the first time, how in-memory data
management is changing the way businesses are run. Today,
enterprise data is split into separate databases for performance
reasons. Multi-core CPUs, large main memories, cloud computing and
powerful mobile devices are serving as the foundation for the
transition of enterprises away from this restrictive model. This
book provides the technical foundation for processing combined
transactional and analytical operations in the same database. In
the year since we published the first edition of this book, the
performance gains enabled by the use of in-memory technology in
enterprise applications has truly marked an inflection point in the
market. The new content in this second edition focuses on the
development of these in-memory enterprise applications, showing how
they leverage the capabilities of in-memory technology. The book is
intended for university students, IT-professionals and IT-managers,
but also for senior management who wish to create new business
processes.
 |
Computer Performance Engineering
- 13th European Workshop, EPEW 2016, Chios, Greece, October 5-7, 2016, Proceedings
(Paperback, 1st ed. 2016)
Dieter Fiems, Marco Paolieri, Agapios N. Platis
|
R1,994
Discovery Miles 19 940
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 13th European
Workshop on Computer Performance Engineering, EPEW 2016, held in
Chios, Greece, in October 2016. The 14 papers presented together
with 2 invited talks in this volume were carefully reviewed and
selected from 25 submissions. The papers presented at the workshop
reflect the diversity of modern performance engineering, with
topics ranging from the analysis of queueing networks and
stochastic processes, to performance analysis of computer systems
and networks, and even modeling of human behavior.
This book constitutes revised selected papers from the 7th
International Workshop on Constructive Side-Channel Analysis and
Secure Design, COSADE 2016, held in Graz, Austria, in April 2016.
The 12 papers presented in this volume were carefully reviewed and
selected from 32 submissions. They were organized in topical
sections named: security and physical attacks; side-channel
analysis (case studies); fault analysis; and side-channel analysis
(tools).
The book provides a comprehensive coverage of different aspects of
low power circuit synthesis at various levels of design hierarchy;
starting from the layout level to the system level. For a seamless
understanding of the subject, basics of MOS circuits has been
introduced at transistor, gate and circuit level; followed by
various low-power design methodologies, such as supply voltage
scaling, switched capacitance minimization techniques and leakage
power minimization approaches. The content of this book will prove
useful to students, researchers, as well as practicing engineers.
Gain a strong foundation of Arduino-based device development, from
which you can go in any direction according to your specific
development needs and desires. You'll build Arduino-powered devices
for everyday use, and then connect those devices to the Internet.
You'll be introduced to the building blocks of IoT, and then deploy
those principles to by building a variety of useful projects.
Projects in the books gradually introduce the reader to key topics
such as internet connectivity with Arduino, common IoT protocols,
custom web visualization, and Android apps that receive sensor data
on-demand and in realtime. IoT device enthusiasts of all ages will
want this book by their side when developing Android-based devices.
If you're one of the many who have decided to build your own
Arduino-powered devices for IoT applications, then Building Arduino
Projects for the Internet of Things is exactly what you need. This
book is your single resource--a guidebook for the eager-to-learn
Arduino enthusiast--that teaches logically, methodically, and
practically how the Arduino works and what you can build with it.
Written by a software developer and solution architect who got
tired of hunting and gathering various lessons for Arduino
development as he taught himself all about the topic. For Arduino
enthusiasts, this book not only opens up the world of IoT
applications, you will also learn many techniques that likely would
not be obvious if not for experience with such a diverse group of
applications What You'll Learn Create an Arduino circuit that
senses temperature Publish data collected from an Arduino to a
server and to an MQTT broker Set up channels in Xively Using
Node-RED to define complex flows Publish data visualization in a
web app Report motion-sensor data through a mobile app Create a
remote control for house lights Set up an app in IBM Bluematrix Who
This Book Is For IoT device enthusiasts of all ages will want this
book by their side when developing Android-based devices.
This tutorial reference takes the reader from use cases to complete
architectures for real-time embedded systems using SysML, UML, and
MARTE and shows how to apply the COMET/RTE design method to
real-world problems. The author covers key topics such as
architectural patterns for distributed and hierarchical real-time
control and other real-time software architectures, performance
analysis of real-time designs using real-time scheduling, and
timing analysis on single and multiple processor systems. Complete
case studies illustrating design issues include a light rail
control system, a microwave oven control system, and an automated
highway toll system. Organized as an introduction followed by
several self-contained chapters, the book is perfect for
experienced software engineers wanting a quick reference at each
stage of the analysis, design, and development of large-scale
real-time embedded systems, as well as for advanced undergraduate
or graduate courses in software engineering, computer engineering,
and software design.
This book aims at describing in detail the different layout
techniques for remarkably boosting the electrical performance and
the ionizing radiation tolerance of planar
Metal-Oxide-Semiconductor (MOS) Field Effect Transistors (MOSFETs)
without adding any costs to the current planar Complementary MOS
(CMOS) integrated circuits (ICs) manufacturing processes. These
innovative layout styles are based on pn junctions engineering
between the drain/source and channel regions or simply MOSFET gate
layout change. These interesting layout structures are capable of
incorporating new effects in the MOSFET structures, such as the
Longitudinal Corner Effect (LCE), the Parallel connection of
MOSFETs with Different Channel Lengths Effect (PAMDLE), the
Deactivation of the Parallel MOSFETs in the Bird's Beak Regions
(DEPAMBBRE), and the Drain Leakage Current Reduction Effect
(DLECRE), which are still seldom explored by the semiconductor and
CMOS ICs industries. Several three-dimensional (3D) numerical
simulations and experimental works are referenced in this book to
show how these layout techniques can help the designers to reach
the analog and digital CMOS ICs specifications with no additional
cost. Furthermore, the electrical performance and ionizing
radiation robustness of the analog and digital CMOS ICs can
significantly be increased by using this gate layout approach.
Ever since its invention in the 1980s, the compound semiconductor
heterojunction-based high electron mobility transistor (HEMT) has
been widely used in radio frequency (RF) applications. This book
provides readers with broad coverage on techniques and new trends
of HEMT, employing leading compound semiconductors, III-N and III-V
materials. The content includes an overview of GaN HEMT
device-scaling technologies and experimental research breakthroughs
in fabricating various GaN MOSHEMT transistors. Readers are offered
an inspiring example of monolithic integration of HEMT with LEDs,
too. The authors compile the most relevant aspects of III-V HEMT,
including the current status of state-of-art HEMTs, their
possibility of replacing the Si CMOS transistor channel, and growth
opportunities of III-V materials on an Si substrate. With detailed
exploration and explanations, the book is a helpful source suitable
for anyone learning about and working on compound semiconductor
devices.
This book offers a comprehensive review of innovative measurement
and monitoring solutions based on time domain reflectometry (TDR).
This technique has numerous applications in several fields, ranging
from the characterization of electronic devices to quality control
of vegetable oils. However, most of the well-established TDR-based
monitoring solutions rely on local or punctual probes; therefore,
typically, to monitor large areas/volumes, a high number of probes
must be employed, with the consequent maintenance and management
requirements. On such bases, in the last few years, the authors
have carried out extensive research on the use of diffused
wire-like sensing elements to be used as probes for TDR
measurements. The basic idea has been to extend the principles of
punctual TDR-based monitoring to multi-purpose networks of
diffused, sensing elements (SE's), embedded permanently within the
systems to be monitored (STBM's). These SEs can be tens of meters
long, and can follow any desired path inside the STBM.; in fact,
they are inactive inside the STBM. Additionally, these SE's are
passive (i.e., they do not require batteries) and their sensing
ability is activated, by the TDR signal, when they are connected to
the measurement instrument. In addition to this, these SE's are
completely maintenance-free. Starting from these considerations,
this book addresses the use of low-cost, passive, flexible,
wire-like SE's to be used in conjunction with TDR. This book also
provides several application test cases, with hints for practical
implementation of the described monitoring systems.
In order to sustain Moore's Law-based device scaling, principal
attention has focused on toward device architectural innovations
for improved device performance as per ITRS projections for
technology nodes up to 10 nm. Efficient integration of lower
substrate temperatures (
As technologists, we are constantly exploring and pushing the
limits of our own disciplines, and we accept the notion that the
efficiencies of new technologies are advancing at a very rapid
rate. However, we rarely have time to contemplate the broader
impact of these technologies as they impact and amplify adjacent
technology disciplines. This book therefore focuses on the
potential impact of those technologies, but it is not intended as a
technical manuscript. In this book, we consider our progress and
current position %toward on arbitrary popular concepts of future
scenarios rather than the typical measurements of cycles per second
or milliwatts. We compare our current human cultural situation to
other past historic events as we anticipate the future social
impact of rapidly accelerating technologies. We also rely on
measurements based on specific events highlighting the breadth of
the impact of accelerating semiconductor technologies rather than
the specific rate of advance of any particular semiconductor
technology. These measurements certainly lack the mathematic
precision and repeatability to which technologists are accustomed,
but the material that we are dealing with-the social objectives and
future political structures of humanity-does not permit a high
degree of mathematic accuracy. Our conclusion draws from the
concept of Singularity. It seems certain that at the rate at which
our technologies are advancing, we will exceed the ability of our
post-Industrial Revolution structures to absorb these new
challenges, and we cannot accurately anticipate what those future
social structures will resemble.
This book covers the critical as well as the less obvious aspects
of managing Microsoft Team Foundation Server 2015 in a variety of
development and test environments. Coverage includes basic
installation, initial configuration, maintenance, and common
trouble shooting techniques, sizing, and performance
considerations. Essentials of Administering Team Foundation Server
2015 explains how TFS can help you incorporate source control in
your development environment. You'll learn how to set up TFS to
match how you develop software. The book covers using TFS in the
whole development process, along with practical advice on how to
use its features effectively to get up to speed quickly. In
addition, the author dives into using TFS in your team covering
subjects like setting up accounts for different roles, manage
users, and groups--plus what you need to know about TFS security
and running a secure team. No discussion of a centralized system
like TFS would be complete without learning how to back up and
restore it, and the author covers what you will need to know to
maintain your TFS including the backup and restore details required
to properly plan for disaster recovery. The book details what you
need to know about TFS functionality in creating and setting up
collections and projects, how to manage the build process with Team
Build (including setting it up and deploying build server and
agents), using templates to speed up the creation of builds,
building multi-platform solutions, and testing. In this book,
you'll learn how to: Plan, install, and configure TFS Secure your
TFS environment Plan and manage source control with TFS Manage the
development process with TFS Manage the build process Test with TFS
Improve the video multimedia services you work on or develop using
tools from video service technologies such as Netflix, Disney+,
YouTube, and Skype. This book introduces you to the core
technologies that enable Metaverse XR (eXtended Reality) services
and advanced video multimedia streaming services. First, you'll
find out about the current and future trends in Metaverse and video
streaming services. XR is a combination of technologies that
include MR, AR, VR, voice recognition systems, haptic and 3D-motion
UIs, as well as head mounted displays) like Microsoft Hololens 2
and Oculus Quest 2. You'll review metaverse services XR
applications and learn more about the core XR feature extraction
technologies. With XR capabilities mastered, you can move into the
main technologies for video streaming services like Netflix,
Disney+, and YouTube. You'll also about video formats, such as
H.264, MPEG-4 AVC, H.265, MPEG-5, and MPEG-DASH. As well as online
hosting services like content delivery network (CDN), mobile CDN,
and Amazon Web Services (AWS). Additional details on content aging
and updating operations along with CDN popularity predictions and
contents update techniques, such as, Least Recently Used (LRU) and
east Frequently Used (LFU) strategies are introduced. All these
technologies enable fast, efficient, reliable, and adaptable video
streaming services. They also allow for video conferencing services
like Zoom, Skype and WebEx. By the time you've finished reading,
you'll understand how these technologies converge into the
Metaverse and and offer a wide variety of development opportunities
for video streaming. What You'll Learn Incorporate core AI
techniques and extraction XR algorithms Enable fast, efficient, and
reliable video streaming in your product, service, or app Update
content with CDN popularity predictions Explore the Netflix Open
Connect CDN model and characteristics Understand the operations of
modern video and multimedia systems Become a leader in metaverse
and video multimedia services and products. Who This Book Is For
Developers, product managers, hobbyists, and students interested in
learning how Metaverse XR and video streaming work and can be
developed.
This book constitutes the refereed proceedings of the 17th
International Workshop on Cryptographic Hardware and Embedded
Systems, CHES 2015, held in Saint Malo, France, in September 2015.
The 34 full papers included in this volume were carefully reviewed
and selected from 128 submissions. They are organized in the
following topical sections: processing techniques in side-channel
analysis; cryptographic hardware implementations; homomorphic
encryption in hardware; side-channel attacks on public key
cryptography; cipher design and cryptanalysis; true random number
generators and entropy estimations; side-channel analysis and fault
injection attacks; higher-order side-channel attacks; physically
unclonable functions and hardware trojans; side-channel attacks in
practice; and lattice-based implementations.
|
You may like...
Band Of Gypsys
Jimi Hendrix
Vinyl record
R716
R654
Discovery Miles 6 540
Dracula
Bram Stoker
Hardcover
R531
R465
Discovery Miles 4 650
|