![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book constitutes revised selected papers of the 7th Latin American High Performance Computing Conference, CARLA 2020, held in Cuenca, Ecuador, in September 2020. Due to the COVID-19 pandemic the conference was held in a virtual mode. The 15 revised full papers presented were carefully reviewed and selected out of 36 submissions. The papers included in this book are organized according to the topics on High Performance Computing Applications; High Performance Computing and Artificial Intelligence.
This two-volume set constitutes the refereed proceedings of the 16th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2020, held in Shanghai, China, in October 2020.The 61 full papers and 16 short papers presented were carefully reviewed and selected from 211 submissions. The papers reflect the conference sessions as follows: Collaborative Applications for Network and E-Commerce; Optimization for Collaborate System; Cloud and Edge Computing; Artificial Intelligence; AI Application and Optimization; Classification and Recommendation; Internet of Things; Collaborative Robotics and Autonomous Systems; Smart Transportation.
This book constitutes the refereed post-conference proceedings of the 6th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Due to COVID-19 pandemic the conference was held virtually The CyberICPS Workshop received 21 submissions from which 5 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyberattacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 4 full papers out of 7 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. From the ADIoT Workshop 2 full papers and 2 short papers out of 12 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery, and intelligent information processing, to relations between rough sets and other approaches to uncertainty, vagueness, and incompleteness, such as fuzzy sets and theory of evidence. Volume XXII in the series is a continuation of a number of research streams that have grown out of the seminal work of Zdzislaw Pawlak during the first decade of the 21st century.
This book constitutes the proceedings of the 18th International Conference on Service-Oriented Computing, ICSOC 2020, which was planned to take place in Dubai, UAE, during December 14-17, 2020. Due to the COVID-19 pandemic the conference was held online. The 23 full, 16 short, and 3 industry papers included in this volume were carefully reviewed and selected from 137 submissions. They were organized in topical sections named: microservices; Internet of Things; services at the edge; machine learning for service oriented computing; smart data and smart services; service oriented technology trends; industry papers.
This book constitutes the refereed proceedings of the 22nd International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2020, held in Austin, TX, USA, in November 2020.The 16 full papers, 7 short and 2 invited papers presented were carefully reviewed and selected from 44 submissions. The papers deal with the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment.
This book constitutes the refereed post-conference proceedings of the 6th Russian Supercomputing Days, RuSCDays 2020, held in Moscow, Russia, in September 2020.* The 51 revised full and 4 revised short papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in the following topical sections: parallel algorithms; supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing. * The conference was held virtually due to the COVID-19 pandemic.
The three-volume set LNCS 12476 - 12478 constitutes the refereed proceedings of the 9th International Symposium on Leveraging Applications of Formal Methods, ISoLA 2020, which was planned to take place during October 20-30, 2020, on Rhodes, Greece. The event itself was postponed to 2021 due to the COVID-19 pandemic. The papers presented were carefully reviewed and selected for inclusion in the proceedings. Each volume focusses on an individual topic with topical section headings within the volume: Part I, Verification Principles: Modularity and (De-)Composition in Verification; X-by-Construction: Correctness meets Probability; 30 Years of Statistical Model Checking; Verification and Validation of Concurrent and Distributed Systems. Part II, Engineering Principles: Automating Software Re-Engineering; Rigorous Engineering of Collective Adaptive Systems. Part III, Applications: Reliable Smart Contracts: State-of-the-art, Applications, Challenges and Future Directions; Automated Verification of Embedded Control Software; Formal methods for DIStributed COmputing in future RAILway systems.
This Festschrift was published in honor of Andre Scedrov on the occasion of his 65th birthday. The 11 technical papers and 3 short papers included in this volume show the many transformative discoveries made by Andre Scedrov in the areas of linear logic and structural proof theory; formal reasoning for networked systems; and foundations of information security emphasizing cryptographic protocols. These papers are authored by researchers around the world, including North America, Russia, Europe, and Japan, that have been directly or indirectly impacted by Andre Scedrov. The chapter "A Small Remark on Hilbert's Finitist View of Divisibility and Kanovich-Okada-Scedrov's Logical Analysis of Real-Time Systems" is available open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the proceedings of the International Conference on Web of Services, ICWS 2020, held virtually as part of SCF 2020, in Honolulu, HI, USA, in September 2020. The 14 full papers presented in this volume were carefully reviewed and selected from 52 submissions. The conference proceeding ICWS 2020 presents the latest fundamental advances in the state of the art and practice of Web-based services, identify emerging research topics, and define the future of Web-based services. All topics regarding Web-centric services, enabling technologies and applications align with the theme of ICWS.
This book constitutes the proceedings of the 13th International Conference on Cloud Computing, CLOUD 2020, held as part of SCF 2020, during September 18-20, 2020. The conference was planned to take place in Honolulu, HI, USA and was changed to a virtual format due to the COVID-19 pandemic.The 16 full and 6 short papers presented were carefully reviewed and selected from 49 submissions. They deal with the latest fundamental advances in the state of the art and practice of cloud computing, identify emerging research topics, and define the future of cloud computing.
This book constitutes the refereed proceedings of the 13th Conference on Advanced Computer Architecture, ACA 2020, held in Kunming, China, in August 2020. Due to the COVID-19 pandemic the conference was held online. The 24 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers of this volume are organized in topical sections on: interconnection network, router and network interface architecture; accelerator-based, application-specific and reconfigurable architecture; processor, memory, and storage systems architecture; model, simulation and evaluation of architecture; new trends of technologies and applications.
This book constitutes the proceedings of the 16th International Workshop on OpenMP, IWOMP 2020, held in Austin, TX, USA, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 21 full papers presented in this volume were carefully reviewed and selected for inclusion in this book. The papers are organized in topical sections named: performance methodologies; applications; OpenMP extensions; performance studies; tools; NUMA; compilation techniques; heterogeneous computing; and memory. The chapters 'A Case Study on Addressing Complex Load Imbalance in OpenMP' and 'A Study of Memory Anomalies in OpenMP Applications' are available open access under a Creative Commons Attribution 4.0 License via link.springer.com.
Few works are as timely and critical to the advancement of high performance computing than is this new up-to-date treatise on leading-edge directions of operating systems. It is a first-hand product of many of the leaders in this rapidly evolving field and possibly the most comprehensive. This new and important book masterfully presents the major alternative concepts driving the future of operating system design for high performance computing. In particular, it describes the major advances of monolithic operating systems such as Linux and Unix that dominate the TOP500 list. It also presents the state of the art in lightweight kernels that exhibit high efficiency and scalability at the loss of generality. Finally, this work looks forward to possibly the most promising strategy of a hybrid structure combining full service functionality with lightweight kernel operation. With this, it is likely that this new work will find its way on the shelves of almost everyone who is in any way engaged in the multi-discipline of high performance computing. (From the foreword by Thomas Sterling)
This book constitutes refereed proceedings of the 4th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2020, held on June 15, 2020. The NTICT conference was planned to take place in Baghdad on March 11-12, 2019, but due to the COVID-19 pandemic the conference has been postponed on June 15, 2020 and moved to the virtual format. The 15 full papers and 3 short papers presented were thoroughly reviewed and selected from 90 qualified submissions. The volume presents the latest research results in such areas as network protocols, overlay and other logical network structures, wireless access networks, computer vision, machine learning, artificial Intelligence, data mining, control methods.
This book contains extended and revised versions of the best papers presented at the 25th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2017, held in Abu Dhabi, United Arab Emirates, in August 2017. The 11 papers included in this book were carefully reviewed and selected from the 33 full papers presented at the conference. The papers cover a wide range of topics in VLSI technology and advanced research. They address the latest scientific and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) Design. On the occasion of the silver jubilee of the VLSI-SoC conference series the book also includes a special chapter that presents the history of the VLSI-SoC series of conferences and its relation with VLSI-SoC evolution since the early 80s up to the present.
This book constitutes the refereed proceedings of two International Workshops held as parallel events of the 15th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2019, in Hersonissos, Crete, Greece, in May 2019: the 8th Mining Humanistic Data Workshop, MHDW 2019, and the 4th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2019. The 6 full papers and 4 short papers presented at MHDW 2019 were carefully reviewed and selected from 13 submissions; out of the 14 papers submitted to 5G-PINE 2019, 6 were accepted as full papers and 1 as short paper. The MHDW papers focus on the application of innovative as well as existing data matching, fusion and mining and knowledge discovery and management techniques (such as decision rules, decision trees, association rules, ontologies and alignments, clustering, filtering, learning, classifier systems, neural networks, support vector machines, preprocessing, post processing, feature selection, visualization techniques) to data derived from all areas of humanistic sciences, e.g., linguistic, historical, behavioral, psychological, artistic, musical, educational, social, and ubiquitous computing and bioinformatics. The papers presented at 5G-PINE focus on several innovative findings coming directly from modern European research in the area of modern 5G telecommunications infrastructures and related innovative services and cover a wide variety of technical and business aspects promoting options for growth and development.
This book contains extended and revised versions of the best papers presented at the 26th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2018, held in Verona, Italy, in October 2018. The 13 full papers included in this volume were carefully reviewed and selected from the 27 papers (out of 106 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like heterogeneous, neuromorphic and brain-inspired, biologically-inspired, approximate computing systems.
The book presents a succession of RISC-V processor implementations in increasing difficulty (non pipelined, pipelined, deeply pipelined, multithreaded, multicore). Each implementation is shown as an HLS (High Level Synthesis) code in C++ which can really be synthesized and tested on an FPGA based development board (such a board can be freely obtained from the Xilinx University Program targeting the university professors). The book can be useful for three reasons. First, it is a novel way to introduce computer architecture. The codes given can serve as labs for a processor architecture course. Second, the book content is based on the RISC-V Instruction Set Architecture, which is an open-source machine language promised to become the machine language to be taught, replacing DLX and MIPS. Third, all the designs are implemented through the High Level Synthesis, a tool which is able to translate a C program into an IP (Intellectual Property). Hence, the book can serve to engineers willing to implement processors on FPGA and to researchers willing to develop RISC-V based hardware simulators.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Engineering Multi-Agent Systems, EMAS 2019, held in Montreal, QC, Canada, in May 2019. The 13 revised full papers presented in this book were carefully selected and reviewed from 20 submissions. The papers are grouped in the following topical sections: Multi-Agent Interaction and Organization; Simulation; Social Awareness and Explainability; Learning and Reconfiguration; and Implementation Techniques and Tools.
This book teaches system programming with the latest versions of C through a set of practical examples and problems. It covers the development of a handful of programs, implementing efficient coding examples. Practical System Programming with C contains three main parts: getting your hands dirty with multithreaded C programming; practical system programming using concepts such as processes, signals, and inter-process communication; and advanced socket-based programming which consists of developing a network application for reliable communication. You will be introduced to a marvelous ecosystem of system programming with C, from handling basic system utility commands to communicating through socket programming. With the help of socket programming you will be able to build client-server applications in no time. The "secret sauce" of this book is its curated list of topics and solutions, which fit together through a set of different pragmatic examples; each topic is covered from scratch in an easy-to-learn way. On that journey, you'll focus on practical implementations and an outline of best practices and potential pitfalls. The book also includes a bonus chapter with a list of advanced topics and directions to grow your skills. What You Will Learn Program with operating systems using the latest version of C Work with Linux Carry out multithreading with C Examine the POSIX standards Work with files, directories, processes, and signals Explore IPC and how to work with it Who This Book Is For Programmers who have an exposure to C programming and want to learn system programming. This book will help them to learn about core concepts of operating systems with the help of C programming. .
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine-they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now-before your hospital becomes the next victim. What You Will Learn: Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack Identify possible ways hackers can hack hospital and healthcare facility equipment Recognize the cyber-attack vectors-or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome Detect and prevent man-in-the-middle or denial-of-service cyber-attacks Find and prevent hacking of the hospital database and hospital web application Who This Book Is For: Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionals
This open access book constitutes the refereed proceedings of the 6th Asian Supercomputing Conference, SCFA 2020, which was planned to be held in February 2020, but unfortunately, the physical conference was cancelled due to the COVID-19 pandemic.The 8 full papers presented in this book were carefully reviewed and selected from 22 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.
This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, held in Gurugram, India, in November 2019. The 74 revised full papers presented were carefully reviewed and selected from total 353 submissions. The papers are organized in topical sections on data centric programming; next generation computing; social and web analytics; security in data science analytics; big data analytics.
This book constitutes the proceedings of the 19th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2020, held in Bialystok, Poland, in October 2020. Due to the COVID-19 pandemic the conference has been postponed to October 2020. The 40 full papers presented together with 5 abstracts of keynotes were carefully reviewed and selected from 62 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems and security; industrial management and other applications; machine learning and high performance computing; modelling and optimization. |
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi
Hardcover
R2,482
Discovery Miles 24 820
The Networknomicon, or SNMP Mastery
Michael W Lucas, Abdul Alhazred
Hardcover
|