0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (81)
  • R500+ (1,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Fast, Efficient and Predictable Memory Accesses - Optimization Algorithms for Memory Architecture Aware Compilation (Paperback,... Fast, Efficient and Predictable Memory Accesses - Optimization Algorithms for Memory Architecture Aware Compilation (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Lars Wehmeyer, Peter Marwedel
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The memory system is increasingly turning into a bottleneck in the design of embedded systems. The speed improvements of memory systems are lower than the speed improvements of processors, eventually leading to embedded systems whose performance is limited by the memory. This problem is known as the "memory wall" problem. Furthermore, memory systems may consume the largest share of the system s energy budget and may be the source of unpredictable timing behaviour. Hence, the design of the memory system deserves an increasing amount of attention.

Fast, Efficient and Predictable Memory Accesses presents techniques for designing fast, energy-efficient and timing predictable memory systems. By using a careful combination of compiler optimizations and architectural improvements, we can achieve more than what would be feasible at one of the levels in isolation. The described optimization algorithms achieve the goals of high performance and low energy consumption. In addition to these benefits, the use of scratchpad memories significantly improves the timing predictability of the entire system, leading to tighter worst case execution time bounds (WCET). The WCET is a relevant design parameter for all timing critical systems. In addition, the book covers algorithms to exploit the power down modes of main memories in SDRAM technology, as well as the execute-in-place feature of Flash memories. The final chapter considers the impact of the register file, which is also part of the memory hierarchy."

Synchronous Programming of Reactive Systems (Paperback, Softcover reprint of hardcover 1st ed. 1993): Nicolas Halbwachs Synchronous Programming of Reactive Systems (Paperback, Softcover reprint of hardcover 1st ed. 1993)
Nicolas Halbwachs
R1,380 Discovery Miles 13 800 Ships in 18 - 22 working days

This book will attempt to give a first synthesis of recent works con cerning reactive system design. The term "reactive system" has been introduced in order to at'oid the ambiguities often associated with by the term "real-time system," which, although best known and more sugges tive, has been given so many different meanings that it is almost in evitably misunderstood. Industrial process control systems, transporta tion control and supervision systems, signal-processing systems, are ex amples of the systems we have in mind. Although these systems are more and more computerized, it is sur prising to notice that the problem of time in computer science has been studied only recently by "pure" computer scientists. Until the early 1980s, time problems were regarded as the concern of performance evalu ation, or of some (unjustly scorned) "industrial computer engineering," or, at best, of operating systems. A second surprising fact, in contrast, is the growth of research con cerning timed systems during the last decade. The handling of time has suddenly become a fundamental goal for most models of concurrency. In particular, Robin Alilner 's pioneering works about synchronous process algebras gave rise to a school of thought adopting the following abstract point of view: As soon as one admits that a system can instantaneously react to events, i. e."

Grid Computing Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Anirban Chakrabarti Grid Computing Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Anirban Chakrabarti
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. It discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students.

Moving Wearables into the Mainstream - Taming the Borg (Paperback, Softcover reprint of hardcover 1st ed. 2008): Joseph L.... Moving Wearables into the Mainstream - Taming the Borg (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Joseph L. Dvorak
R2,887 Discovery Miles 28 870 Ships in 18 - 22 working days

The term Wearable Technology encompasses a wide spectrum of devices, services and systems for wireless communications and the web. This book discusses characteristics and design elements required for wearable devices and systems to be embraced by the mainstream population for use in their everyday lives, introducing concepts such as Operational Inertia. The book discusses social and legal issues that may pose the greatest impediment to adoption of wearables. The book is structured to meet the needs of researchers and practitioners in industry, and can also be used as a secondary text in advanced-level courses in computer science and electrical engineering.

Scheduling in Distributed Computing Systems - Analysis, Design and Models (Paperback, Softcover reprint of hardcover 1st ed.... Scheduling in Distributed Computing Systems - Analysis, Design and Models (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Deo Prakash Vidyarthi, Biplab Kumer Sarker, Anil Kumar Tripathi, Laurence Tianruo Yang
R4,016 Discovery Miles 40 160 Ships in 18 - 22 working days

This book intends to inculcate the innovative ideas for the scheduling aspect in distributed computing systems. Although the models in this book have been designed for distributed systems, the same information is applicable for any type of system. The book will dramatically improve the design and management of the processes for industry professionals. It deals exclusively with the scheduling aspect, which finds little space in other distributed operating system books. Structured for a professional audience composed of researchers and practitioners in industry, this book is also suitable as a reference for graduate-level students.

Do-All Computing in Distributed Systems - Cooperation in the Presence of Adversity (Paperback, Softcover reprint of hardcover... Do-All Computing in Distributed Systems - Cooperation in the Presence of Adversity (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Chryssis Georgiou
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book studies algorithmic issues associated with cooperative execution of multiple independent tasks by distributed computing agents including partitionable networks. It provides the most significant algorithmic solution developed and available today for do-all computing for distributed systems (including partitionable networks), and is the first monograph that deals with do-all computing for distributed systems. The book is structured to meet the needs of a professional audience composed of researchers and practitioners in industry. This volume is also suitable for graduate-level students in computer science.

Distributed and Parallel Systems - In Focus: Desktop Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2008):... Distributed and Parallel Systems - In Focus: Desktop Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Peter Kacsuk, Robert Lovas, Zsolt Nemeth
R2,632 Discovery Miles 26 320 Ships in 18 - 22 working days

DAPSYS (International Conference on Distributed and Parallel Systems) is an international biannual conference series dedicated to all aspects of distributed and parallel computing. DAPSYS 2008, the 7th International Conference on Distributed and Parallel Systems was held in September 2008 in Hungary. Distributed and Parallel Systems: Desktop Grid Computing, based on DAPSYS 2008, presents original research, novel concepts and methods, and outstanding results. Contributors investigate parallel and distributed techniques, algorithms, models and applications; present innovative software tools, environments and middleware; focus on various aspects of grid computing; and introduce novel methods for development, deployment, testing and evaluation. This volume features a special focus on desktop grid computing as well. Designed for a professional audience composed of practitioners and researchers in industry, this book is also suitable for advanced-level students in computer science.

The Testing Network - An Integral Approach to Test Activities in Large Software Projects (Paperback, Softcover reprint of... The Testing Network - An Integral Approach to Test Activities in Large Software Projects (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Jean-Jacques Pierre Henry
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

"The Testing Network" presents an integrated approach to testing based on cutting-edge methodologies, processes and tools in today's IT context. It means complex network-centric applications to be tested in heterogeneous IT infrastructures and in multiple test environments (also geographically distributed). The added-value of this book is the in-depth explanation of all processes and relevant methodologies and tools to address this complexity. Main aspects of testing are explained using TD/QC - the world-leader test platform.

This up-to-date know-how is based on real-life IT experiences gained in large-scale projects of companies operating worldwide. The book is abundantly illustrated to better show all technical aspects of modern testing in a national and international context. The author has a deep expertise by designing and giving testing training in large companies using the above-mentioned tools and processes. "The Testing Network" is a unique synthesis of core test topics applied in real-life.

Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation... Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Volker Herminghaus, Albrecht Scriba
R1,588 Discovery Miles 15 880 Ships in 18 - 22 working days

Storage Management in Data Centers helps administrators tackle the complexity of data center mass storage. It shows how to exploit the potential of Veritas Storage Foundation by conveying information about the design concepts of the software as well as its architectural background. Rather than merely showing how to use Storage Foundation, it explains why to use it in a particular way, along with what goes on inside. Chapters are split into three sections: An introductory part for the novice user, a full-featured part for the experienced, and a technical deep dive for the seasoned expert. An extensive troubleshooting section shows how to fix problems with volumes, plexes, disks and disk groups. A snapshot chapter gives detailed instructions on how to use the most advanced point-in-time copies. A tuning chapter will help you speed up and benchmark your volumes. And a special chapter on split data centers discusses latency issues as well as remote mirroring mechanisms and cross-site volume maintenance. All topics are covered with the technical know how gathered from an aggregate thirty years of experience in consulting and training in data centers all over the world.

Principles of Distributed Systems - 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011,... Principles of Distributed Systems - 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011, Proceedings (Paperback, 2011 ed.)
Antonio Fernandez Anta, Giuseppe Lipari, Matthieu Roy
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Principles of Distributed Systems, OPODIS 2011, held in Toulouse, France, in December 2011. The 26 revised papers presented in this volume were carefully reviewed and selected from 96 submissions. They represent the current state of the art of the research in the field of the design, analysis and development of distributed and real-time systems.

Sensor Systems and Software - Second International ICST Conference, S-Cube 2010, Miami, FL, December 13-15, 2010, Revised... Sensor Systems and Software - Second International ICST Conference, S-Cube 2010, Miami, FL, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Gerard Parr, Philip Morrow
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Sensor Systems and Software, S-Cube 2010, held in Miami, Florida, USA, in December 2010. The 17 revised full papers presented were carefully reviewed and selected and cover a wide range of topics including sensor application programming paradigms, novel sensor applications, sensor network middleware, trust security and privacy, wireless sensor network management and monitoring, and sensor application development support systems.

Forensics in Telecommunications, Information and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai,... Forensics in Telecommunications, Information and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers (Paperback, 2011 ed.)
Xuejia Lai, Dawu Gu, Bo Jin, Yong Wang, Hui Li
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.

Dependable and Historic Computing - Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday (Paperback, 2011):... Dependable and Historic Computing - Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday (Paperback, 2011)
Cliff B. Jones, John L. Lloyd
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell. The papers focus on the core of Brian Randell's work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell's love of maps. After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.

Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October... Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings (Paperback)
Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June... Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings (Paperback, Edition.)
Bart De Decker, Ingrid Schaumuller-Bichl
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly, ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of "friends," happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many new applications, ranging from smart shopping, and smart fridges to geo-localized services. In the near future, elderly people will be able to stay longer at home due to clever health monitoring systems. The sky seems to be the limit However, we have also seen the other side of the coin: viruses, Trojan horses, breaches of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encouragesecurity researchby both academia and industry and to stimulate the dissemination of results, conferences need to be organized. With the 11th edition of the joint IFIP TC-6 TC-11 Conference on C- munications and Multimedia Security (CMS 2010), the organizers resumed the tradition of previous CMS conferences after a three-year recess.

E-Government ICT Professionalism and Competences Service Science - IFIP 20th World Computer Congress, Industry Oriented... E-Government ICT Professionalism and Competences Service Science - IFIP 20th World Computer Congress, Industry Oriented Conferences, September 7-10, 2008, Milano, Italy (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Antonino Mazzeo, Roberto Bellini, Gianmario Motta
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of Industry Oriented Conferences held at IFIP 20th World Computer Congress in September 2008.

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on... Distributed Embedded Systems: Design, Middleware and Resources - IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Bernd Kleinjohann, Lisa Kleinjohann, Marilyn Wolf
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This year, the IFIP Working Conference on Distributed and Parallel Embedded Sys tems (DIPES 2008) is held as part of the IFIP World Computer Congress, held in Milan on September 7 10, 2008. The embedded systems world has a great deal of experience with parallel and distributed computing. Many embedded computing systems require the high performance that can be delivered by parallel computing. Parallel and distributed computing are often the only ways to deliver adequate real time performance at low power levels. This year's conference attracted 30 submissions, of which 21 were accepted. Prof. Jor ] g Henkel of the University of Karlsruhe graciously contributed a keynote address on embedded computing and reliability. We would like to thank all of the program committee members for their diligence. Wayne Wolf, Bernd Kleinjohann, and Lisa Kleinjohann Acknowledgements We would like to thank all people involved in the organization of the IFIP World Computer Congress 2008, especially the IPC Co Chairs Judith Bishop and Ivo De Lotto, the Organization Chair Giulio Occhini, as well as the Publications Chair John Impagliazzo. Further thanks go to the authors for their valuable contributions to DIPES 2008. Last but not least we would like to acknowledge the considerable amount of work and enthusiasm spent by our colleague Claudius Stern in preparing theproceedingsofDIPES2008. Hemadeitpossibletoproducethemintheircurrent professional and homogeneous style."

New Horizons of Parallel and Distributed Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005): Minyi Guo,... New Horizons of Parallel and Distributed Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Minyi Guo, Laurence Tianruo Yang
R4,026 Discovery Miles 40 260 Ships in 18 - 22 working days

Parallel and distributed computing is one of the foremost technologies for shaping
future research and development activities in academia and industry. Hyperthreading in Intel processors, hypertransport links in next generation AMD processors, multicore silicon in today's high-end microprocessors, and emerging cluster and grid computing have moved parallel/distributed computing into the mainstream of computing.

New Horizons of Parallel and Distributed Computing is a collection of self-contained chapters written by pioneering researchers to provide solutions for newly emerging problems in this field. This volume will not only provide novel ideas, work in progress and state-of-the-art techniques in the field, but will also stimulate future research activities in the area of parallel and distributed computing with applications.

New Horizons of Parallel and Distributed Computing is intended for industry researchers and developers, as well as for academic researchers and advanced-level students in computer science and electrical engineering. A valuable reference work, it is also suitable as a textbook.

Compiling with Continuations (Paperback, Revised): Andrew W. Appel Compiling with Continuations (Paperback, Revised)
Andrew W. Appel
R2,388 Discovery Miles 23 880 Ships in 10 - 15 working days

The control and data flow of a program can be represented using continuations, a concept from denotational semantics that has practical application in real compilers. This book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. Continuations can be used to compile most programming languages. The method is illustrated in a compiler for the programming language Standard ML. However, prior knowledge of ML is not necessary, as the author carefully explains each concept as it arises. This is the first book to show how concepts from the theory of programming languages can be applied to the producton of practical optimising compilers for modern languages like ML. This book will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.

Advances in Grid and Pervasive Computing - 5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010,... Advances in Grid and Pervasive Computing - 5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010, Proceedings (Paperback, 2010 ed.)
Paolo Bellavista, Ruay-Shiung Chang, Han-Chieh Chao, Shin-Feng Lin, Peter M. A. Sloot
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

Grid and Pervasive Computing (GPC) is an annual international conference on the emerging areas of grid computing and pervasive computing, aimed at p- viding an exciting platform and paradigm for all-the-time, everywhere services. GPC 2010 provided a high-pro?le, leading-edgeforum for researchersand dev- opers from industry and academia to present their latest research in the ?eld of grid and pervasive computing. Three workshops were held in conjunction with the GPC 2010 conference: * The First International Workshop on Intelligent Management of Networked Environment (IMNE 2010) * International Workshop on Multimedia Applications for Cloud (MAC 2010) * The 6thInternationalWorkshopon Mobile Commerce andServices (WMCS 2010) The proceedingsof these workshoparealso included in this volume. We received 184 papers originating from 22 countries. The Program Committee ?nally - lected 67 papers for presentation at the conference and inclusion in this LNCS volume. At GPC 2010, we were very pleased to have four distinguished invited speakers, who delivered state-of-the-art information on the conference topics: * A grid based virtual laboratory for HIV drugranking by Peter Sloot (U- versity of Amsterdam, The Netherlands) * Solving the scalability dilemma with clouds, crowds, and algorithms by Michael J. Franklin (University of California, Berkeley, USA) * The trend of cloud computing - from industry's perspective by Enwei Xie (Microsoft Greater China Region, China) * Towards ubiquitous a?ective learning by Bin Hu (The Birmingham City University, UK) Theconferencewouldnothavebeenpossiblewithoutthesupportofmanypeople andorganizationsthathelped invariouswaysto makeita success.

Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback,... Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback, Edition.)
Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe
R1,739 Discovery Miles 17 390 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011,... Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings (Paperback, Edition.)
Udaya Parampalli, Philip Hawkes
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Classic Operating Systems - From Batch Processing to Distributed Systems (Paperback, Softcover reprint of hardcover 1st ed.... Classic Operating Systems - From Batch Processing to Distributed Systems (Paperback, Softcover reprint of hardcover 1st ed. 2001)
Per Brinch Hansen
R2,777 Discovery Miles 27 770 Ships in 18 - 22 working days

This remarkable anthology allows the pioneers who orchestrated the major breakthroughs in operating system technology to describe their work in their own words. From the batch processing systems of the 1950s to the distributed systems of the 1990s, Tom Kilburn, David Howarth, Bill Lynch, Fernando Corbato, Robert Daley, Sandy Fraser, Dennis Ritchie, Ken Thompson, Edsger Dijkstra, Per Brinch Hansen, Soren Lauesen, Barbara Liskov, Joe Stoy, Christopher Strachey, Butler Lampson, David Redell, Brian Randell, Andrew Tanenbaum, and others describe the systems they designed. The volume details such classic operating systems as the Atlas, B5000, Exec II, Egdon, CTSS, Multics, Titan, Unix, THE, RC 4000, Venus, Boss 2, Solo, OS 6, Alto, Pilot, Star, WFS, Unix United, and Amoeba systems. An introductory essay on the evolution of operating systems summarizes the papers and helps puts them into a larger perspective. This provocative journey captures the historic contributions of operating systems to software design, concurrent programming, graphic user interfaces, file systems, personal computing, and distributed systems. It also fully portrays how operating systems designers think. It's ideal for everybody in the field, from students to professionals, academics to enthusiasts.

Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003): Axel Jantsch, Hannu Tenhunen Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Axel Jantsch, Hannu Tenhunen
R4,223 Discovery Miles 42 230 Ships in 18 - 22 working days

Networks on Chip presents a variety of topics, problems and approaches with the common theme to systematically organize the on-chip communication in the form of a regular, shared communication network on chip, an NoC for short.

As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary. Different variants of packed switched on-chip networks have been proposed by several groups during the past two years. This book summarizes the state of the art of these efforts and discusses the major issues from the physical integration to architecture to operating systems and application interfaces. It also provides a guideline and vision about the direction this field is moving to. Moreover, the book outlines the consequences of adopting design platforms based on packet switched network. The consequences may in fact be far reaching because many of the topics of distributed systems, distributed real-time systems, fault tolerant systems, parallel computer architecture, parallel programming as well as traditional system-on-chip issues will appear relevant but within the constraints of a single chip VLSI implementation.

The book is organized in three parts. The first deals with system design and methodology issues. The second presents problems and solutions concerning the hardware and the basic communication infrastructure. Finally, the third part covers operating system, embedded software and application. However, communication from the physical to the application level is a central theme throughout the book.

The book serves as an excellent reference source and may be used as a text for advanced courses on the subject.

From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005): Achim Rettberg,... From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Achim Rettberg, Mauro C. Zanella, Franz J. Rammig
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase.

Synergy effects resulting from distributed application functionalities via several electronic control devies, exchanging information through the network brings about more complex system architectures with many different sub-networks, operating with different velocities and different protocol implementations.

To manage the increasing complexity of these systems, a deterministic behaviour of the control units and the communication network must be provided for, in particular when dealing with a distributed functionality.

From Specification to Embedded Systems Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), which was held in August 2005 in Manaus (Brazil) and sponsored by the International Federation for Information Processing (IFIP).

The topics which have been chosen for this working conference are very timely: design methodology, modeling, specification, software synthesis, power management, formal verification, testing, network, communication systems, distributed control systems, resource management and special aspects in system design.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Epic Land - Namibia Exposed
Amy Schoeman Hardcover R580 Discovery Miles 5 800
On the Cusp - From Population Boom to…
Charles S. Pearson Hardcover R1,179 Discovery Miles 11 790
Science and Geopolitics of The White…
Prem Shankar Goel, Rasik Ravindra, … Hardcover R4,597 Discovery Miles 45 970
Geographers, v. 11 - Biobibliographical…
T.W. Freeman Hardcover R4,006 Discovery Miles 40 060
A General Account of All the Rivers of…
Henry Skrine Paperback R640 Discovery Miles 6 400
Microwave Remote Sensing of Land…
Nicolas Baghdadi, Mehrez Zribi Hardcover R2,682 Discovery Miles 26 820
Adjusting to a World in Motion - Trends…
Douglas J. Besharov, Mark H. Lopez Hardcover R2,889 Discovery Miles 28 890
Lost On The Map - A Memoir Of Colonial…
Bryan Rostron Paperback R340 R314 Discovery Miles 3 140
My Revision Notes: Pearson Edexcel A…
Michael Witherick, Dan Cowling, … Paperback R741 Discovery Miles 7 410
A Guide To Tidal Pools Of The Western…
Serai Dowling Paperback R395 R365 Discovery Miles 3 650

 

Partners