![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018. The 22 full and 12 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The papers cover traditional areas of network and parallel computing, including parallel applications, distributed algorithms, parallel architectures, software environments, and distributed tools.
This book constitutes the proceedings of the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The 63 full papers presented together with 3 keynotes in this volume were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: Microservices; Services and Processes; Service Trust and Security; Business Services and Processes; Edge + IoT Services; Social and Interactive Services; Recommendation; Service Analytics; Quality of Service; Service Engineering; Service Applications; Service Management.
This book constitutes the refereed conference proceedings of the 26th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2019, held in L'Aquila, Italy, in July 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 39 submissions. They are devoted to the study of the interplay between structural knowledge, communication, and computing in decentralized systems of multiple communicating entities.
Track, branch, merge, and manage code revisions with Git, the free and open source distributed version control system. Through a series of step-by-step tutorials, this practical guide quickly takes you from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating Git's many functions. You'll learn how to work with everything from small to very large projects with speed and efficiency. In this third edition, authors Prem Kumar Ponuthorai and Jon Loeliger break down Git concepts using a modular approach. You'll start with the basics and fundamental philosophy of Git, followed by intermediate commands to help you efficiently supplement your daily development workflow. Finally, you'll learn advanced Git commands and concepts to understand how Git works under the hood. Learn how to use Git for real-world development scenarios Gain insight into Git's common use cases, initial tasks, and basic functions Use the system for distributed version control Learn how to manage merges, conflicts, patches, and diffs Apply advanced techniques such as rebasing, hooks, and ways to handle submodules
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs).Throughout the book, complete working sample systems demonstrate the design principles and implementation techniques. The content is suitable for advanced-level and graduate students working in software engineering, programming, and systems theory.
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018. The 12 full papers and 7 short papers presented together with 3 keynotes, 2 tutorials, and 1 anniversary paper were carefully reviewed and selected from 21 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing. Chapter "Deploying Search Based Software Engineering with Sapienz at Facebook" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book constitutes the refereed proceedings of the 12th Annual Conference on Advanced Computer Architecture, ACA 2018, held in Yingkou, China, in August 2018. The 17 revised full papers presented were carefully reviewed and selected from 80 submissions. The papers of this volume are organized in topical sections on: accelerators; new design explorations; towards efficient ML/AI; parallel computing system.
This book contains revised selected and invited papers presented at the International Workshop on Massively Multi-Agent Systems, MMAS 2018, held in Stockholm, Sweden, in July 2018. The 7 revised full papers presented were carefully reviewed and selected for inclusion in this volume. Also included are 3 post-workshop papers. The papers discuss enabling technologies, new architectures, promising applications, and challenges of massively multi-agent systems in the era of IoT. They are organized in the following topical sections: multi-agent systems and Internet of Things; architectures for massively multi-agent systems; and applications of massively multi-agent systems.
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize both theory and programming practice. The book contains many detailed working example programs with complete source code. It is also suitable for self-study by advanced programmers and computer enthusiasts. Systems programming is an indispensable part of Computer Science/Engineering education. After taking an introductory programming course, this book is meant to further knowledge by detailing how dynamic data structures are used in practice, using programming exercises and programming projects on such topics as C structures, pointers, link lists and trees. This book provides a wide range of knowledge about computer systemsoftware and advanced programming skills, allowing readers to interface with operatingsystem kernel, make efficient use of system resources and develop application software.It also prepares readers with the needed background to pursue advanced studies inComputer Science/Engineering, such as operating systems, embedded systems, databasesystems, data mining, artificial intelligence, computer networks, network security,distributed and parallel computing.
This book is a study guide for Huawei (HCNA) certification. It has been written to help readers understand the principles of network technologies. It covers topics including network fundamentals, Ethernet, various protocols such as those used in routing, and Huawei's own VRP operating system-all essential aspects of HCNA certification. Presenting routing and switching basics in depth, it is a valuable resource for information and communications technology (ICT) practitioners, university students and network technology fans.
This book offers a comprehensive and systematic introduction to the latest research on hesitant fuzzy decision-making theory. It includes six parts: the hesitant fuzzy set and its extensions, novel hesitant fuzzy measures, hesitant fuzzy hybrid weighted aggregation operators, hesitant fuzzy multiple-criteria decision-making with incomplete weights, hesitant fuzzy multiple criteria decision-making with complete weights information, and the hesitant fuzzy preference relation based decision-making theory. These methodologies are implemented in various fields such as decision-making, medical diagnosis, cluster analysis, service quality management, e-learning management and environmental management. A valuable resource for engineers, technicians, and researchers in the fields of fuzzy mathematics, operations research, information science, management science and engineering, it can also be used as a textbook for postgraduate and senior undergraduate students.
This book constitutes the refereed proceedings of the 33rd International Conference, ISC High Performance 2018, held in Frankfurt, Germany, in June 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 81 submissions. The papers cover the following topics: Resource Management and Energy Efficiency; Performance Analysis and Tools; Exascale Networks; Parallel Algorithms.
This book constitutes the refereed proceedings of the 15th National Conference on Embedded Systems Technology, ESTC 2017, held in Shenyang, China, in November 2017. The 18 revised full papers presented were carefully reviewed and selected from 45 papers. The topics cover a broad range of fields focusing on the theme "embedded systems and intelligent computing," such as context aware computing, scheduling, cyber physical system, high performance embedded computing, embedded system and applications, and education and surveys.
This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The evaluation methods are discussed in depth. It also covers the analysis of the 5G candidate technologies and the testing challenges, the evolution of the testing technologies, fading channel measurement and modeling, software simulations, software hardware cosimulation, field testing and other novel evaluation methods. The fifth-generation (5G) mobile communications system targets highly improved network performances in terms of the network capacity and the number of connections. Testing and evaluation technologies is widely recognized and plays important roles in the wireless technology developments, along with the research on basic theory and key technologies. The investigation and developments on the multi-level and comprehensive evaluations for 5G new technologies, provides important performance references for the 5G technology filtering and future standardizations. Students focused on telecommunications, electronic engineering, computer science or other related disciplines will find this book useful as a secondary text. Researchers and professionals working within these related fields will also find this book useful as a reference.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This twenty-eight issue is a special issue with 11 selected papers from the International Conference on Agents and Artificial Intelligence, ICAART 2016 and 2017 editions.
This book constitutes the refereed proceedings of the 11th International Conference on Model Transformation, ICMT 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 9 full papers were carefully reviewed and selected from 24 submissions. This book also presents 1 invited paper. The papers include research, application, and tool demonstration papers presented in the context of four sessions on verification of model transformations, model transformation tools, transformation reuse and graph transformations.
This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologies to operational platforms, quality measurements and assurance and future directions. It also includes guidelines and numerous representative real-world case studies that serve as an invaluable reference resource for software engineers involved in the development of Internetware applications. Providing a detailed analysis of current trends in modern software engineering in the Internet, it offers an essential blueprint and an important contribution to the research on software engineering and systems for future Internet computing.
This book constitutes the refereed post-conference proceedings of the 25th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2018, held in Ma'ale HaHamisha, Israel, in June 2018. The 23 full papers and 8 short papers presented were carefully reviewed and selected from 47 submissions. They are devoted to the study of the interplay between structural knowledge, communications, and computing in decentralized systems of multiple communicating entities and cover a large range of topics.
The tools, guidelines, and procedures that IS auditors need Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly understand whether or not their computing systems are safe. The book provides a detailed examination of contemporary auditing issues such as:
Auditing Information Systems, Second Edition gives auditing professionals the tools they need to get their job done right. It is a must-have reference for any auditor’s library.
This book constitutes the refereed proceedings of the 4th International Conference on Tools and Methods for Program Analysis, TMPA 2017, Moscow, Russia, March 3-4, 2017. The 12 revised full papers and 5 revised short papers presented together with three abstracts of keynote talks were carefully reviewed and selected from 51 submissions. The papers deal with topics such as software test automation, static program analysis, verification, dynamic methods of program analysis, testing and analysis of parallel and distributed systems, testing and analysis of high-load and high-availability systems, analysis and verification of hardware and software systems, methods of building quality software, tools for software analysis, testing and verification.
This book constitutes the refereed proceedings of the 13th Colombian Conference on Computing, CCC 2018, held in Cartagena, Colombia, in September 2018. The 46 revised full papers presented were carefully reviewed and selected from 194 submissions. The papers deal with the following topics: information and knowledge management, software engineering and IT architectures, educational informatics, intelligent systems and robotics, human-computer interaction, distributed systems and large-scale architectures, image processing, computer vision and multimedia, security of the information, formal methods, computational logic, and theory of computation.
This book constitutes the refereed proceedings papers from the 8th International Workshop on Performance Modeling, Benchmarking and Simulation of High Performance Computing Systems, PMBS 2017, held in Denver, Colorado, USA, in November 2017. The 10 full papers and 3 short papers included in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: performance evaluation and analysis; performance modeling and simulation; and short papers.
This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented were carefully reviewed and selected from 28 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems. |
![]() ![]() You may like...
Introduction To Psychological Assessment…
Cheryl Foxcroft, Francois de Kock
Paperback
R610
Discovery Miles 6 100
The 8th International Conference on…
Lorna Uden, Leon S.L. Wang, …
Hardcover
R5,709
Discovery Miles 57 090
Fundamentals Of Research Methodology For…
Hilla Brink, Gisela Van Rensburg
Paperback
R375
Discovery Miles 3 750
|