![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book constitutes refereed proceedings of the 4th International Conference on New Trends in Information and Communications Technology Applications, NTICT 2020, held on June 15, 2020. The NTICT conference was planned to take place in Baghdad on March 11-12, 2019, but due to the COVID-19 pandemic the conference has been postponed on June 15, 2020 and moved to the virtual format. The 15 full papers and 3 short papers presented were thoroughly reviewed and selected from 90 qualified submissions. The volume presents the latest research results in such areas as network protocols, overlay and other logical network structures, wireless access networks, computer vision, machine learning, artificial Intelligence, data mining, control methods.
This book constitutes the refereed proceedings of the 22nd International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2020, held in Austin, TX, USA, in November 2020.The 16 full papers, 7 short and 2 invited papers presented were carefully reviewed and selected from 44 submissions. The papers deal with the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment.
This book constitutes the refereed proceedings of the 10th International Conference on Supercomputing, ISUM 2019, held in Monterrey, Mexico, in March 2019.The 25 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on HPC architecture, networks, system software, algorithmic techniques, modeling and system tools, clouds, distributed computing, big data, data analytics, visualization and storage, applications for science and engineering, and emer- ging technologies.
This book constitutes the 13th edition of the annual Multi-Agent Programming Contest, MAPC 2018, and presents its participants. The 2018 scenario and all its changes from previous competitions are described in the first contribution, together with a brief description and analysis of the five participating teams and a closer look at the matches. It is followed by a contribution from each team, introducing their methods and tools used to create their agent team and analyzing their performance and the contest.
This Open Access book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and -now- connected human societies? Physicists have good models for describing the evolution of the universe since the Big Bang, but can we apply the same concepts to the evolution of aggregated matter -living matter included? The Amazing Journey analyzes the latest results in chemistry, biology, neuroscience, anthropology and sociology under the light of the evolution of intelligence, seen as the ability of processing information. The main strength of this book is using just two concepts used in physics -information and energy- to explain: The emergence and evolution of life: procaryotes, eukaryotes and complex organisms The emergence and evolution of the brain The emergence and evolution of societies (human and not) Possible evolution of our "internet society" and the role that Artificial Intelligence is playing
The two-volume set LNCS 11944-11945 constitutes the proceedings of the 19th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2019, held in Melbourne, Australia, in December 2019. The 73 full and 29 short papers presented were carefully reviewed and selected from 251 submissions. The papers are organized in topical sections on: Parallel and Distributed Architectures, Software Systems and Programming Models, Distributed and Parallel and Network-based Computing, Big Data and its Applications, Distributed and Parallel Algorithms, Applications of Distributed and Parallel Computing, Service Dependability and Security, IoT and CPS Computing, Performance Modelling and Evaluation.
This book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020. The 20 full and 3 short papers presented in this volume were carefully reviewed and selected from 110 submissions. In addition, the book included 6 invited papers. The contributions were organized in topical sections named: invited talks; concurrent and distributed systems modelling and verification; cloud and grid computing; social networks, machine learning and mobile networks; data processing and blockchain technology; and short papers.
The control and data flow of a program can be represented using continuations, a concept from denotational semantics that has practical application in real compilers. This book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. Continuations can be used to compile most programming languages. The method is illustrated in a compiler for the programming language Standard ML. However, prior knowledge of ML is not necessary, as the author carefully explains each concept as it arises. This is the first book to show how concepts from the theory of programming languages can be applied to the producton of practical optimising compilers for modern languages like ML. This book will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.
This book constitutes the refereed proceedings of the 13th Conference on Advanced Computer Architecture, ACA 2020, held in Kunming, China, in August 2020. Due to the COVID-19 pandemic the conference was held online. The 24 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers of this volume are organized in topical sections on: interconnection network, router and network interface architecture; accelerator-based, application-specific and reconfigurable architecture; processor, memory, and storage systems architecture; model, simulation and evaluation of architecture; new trends of technologies and applications.
This volume constitutes the proceedings of the 13th International Conference on Combinatorial Optimization and Applications, COCOA 2019, held in Xiamen, China, in December 2019. The 49 full papers presented in this volume were carefully reviewed and selected from 108 submissions. The papers cover the various topics, including cognitive radio networks, wireless sensor networks, cyber-physical systems, distributed and localized algorithm design and analysis, information and coding theory for wireless networks, localization, mobile cloud computing, topology control and coverage, security and privacy, underwater and underground networks, vehicular networks, information processing and data management, programmable service interfaces, energy-efficient algorithms, system and protocol design, operating system and middleware support, and experimental test-beds, models and case studies.
This book constitutes the refereed proceedings of the 21st International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2019, held in Pisa, Italy, in October 2019.The 21 full papers presented were carefully reviewed and selected from 45 submissions. The papers deal with the design and development of distributed systems with a focus on systems that are able to provide guarantees on their structure, performance, and/or security in the face of an adverse operational environment.
This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019. Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first.
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine-they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now-before your hospital becomes the next victim. What You Will Learn: Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack Identify possible ways hackers can hack hospital and healthcare facility equipment Recognize the cyber-attack vectors-or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome Detect and prevent man-in-the-middle or denial-of-service cyber-attacks Find and prevent hacking of the hospital database and hospital web application Who This Book Is For: Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionals
This book constitutes the proceedings of the 16th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2019, held in Hohhot, China, in August 2019. The 22 full and 11 short papers presented in this volume were carefully reviewed and selected from 107 submissions. They were organized in topical sections named: graph computing; NOC and networks; neural networks; big data and cloud; HPC; emerging topics; memory and file system.
This book constitutes the proceedings of the 13th International Symposium on Advanced Parallel Processing Technologies, APPT 2019, held in Tianjin, China, in August 2019. The 11 full papers presented in this volume were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections named: System Support for Neural Networks; Scheduling and File Systems; Optimization and Parallelization; Security and Algorithms.
This open access book constitutes the refereed proceedings of the 6th Asian Supercomputing Conference, SCFA 2020, which was planned to be held in February 2020, but unfortunately, the physical conference was cancelled due to the COVID-19 pandemic.The 8 full papers presented in this book were carefully reviewed and selected from 22 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.
This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019. The 9 revised full papers included in this volume were carefully reviewed and selected from 24 initial submissions. The papers are organized in the following topical sections: intelligent transportation systems; distributed computing for networking and communication; articial intelligence applied to cyber physical systems.
This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.
This book constitutes the proceedings of the 30th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2017, held in College Station, TX, USA, in October 2017. The 17 full papers presented together with abstracts of 5 keynote talks, 11 invited speakers and 4 poster papers in this volume were carefully reviewed and selected from 26 submissions. LCPC encourages submissions that go outside its original scope of scientific computing to diverse areas that are enable or enhanced by the power of parallel systems such as mobile computing, big data, relevant aspects of machine learning, data centers, cognitive computing, etc. LCPC strongly encourages personal interaction and technical discussions along the initial material.
This book constitutes the proceedings of the 32nd International Conference on Architecture of Computing Systems, ARCS 2019, held in Copenhagen, Denmark, in May 2019. The 24 full papers presented in this volume were carefully reviewed and selected from 40 submissions. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers are organized in the following topical sections: Dependable systems; real-time systems; special applications; architecture; memory hierarchy; FPGA; energy awareness; NoC/SoC. The chapter 'MEMPower: Data-Aware GPU Memory Power Model' is open access under a CC BY 4.0 license at link.springer.com.
Accessible to the Lean novice and shop floor employee, The Basics of Line Balancing and JIT Kitting explores line balancing and the pre-assembly of components into a finished product in a just-in-time fashion (JIT Kitting). It explains how to use time studies, develop yamazumi charts, discover and eliminate waste, balance your line, and create new standard work content for the shop floor. The book facilitates a clear understanding of the seven deadly wastes (muda) as well as what you can do to eliminate them from your facility. Describing the purpose and use of standard work, it explains how to properly staff work cells and how to develop flex plans for fluctuations in demand using this data. The first few chapters explain how to determine takt time and how to use that information along with time studies to identify when you are not meeting customer demand. The chapters on JIT Kitting explain how there are other advantages to kitting besides eliminating waste and increasing productivity. The book explains how you can use JIT Kitting to improve quality by having the parts available and limiting the options of numerous parts to the operator. It also provides the understanding needed to ensure the right parts are installed, thereby correcting issues with the build of materials.
This open access book constitutes the refereed proceedings of the 5th Asian Supercomputing Conference, SCFA 2019, held in Singapore in March 2019. The 6 full papers presented in this book were carefully reviewed and selected from 33 submissions. They cover a range of topics including memory fault handling, linear algebra, image processing, heterogeneous computing, resource usage prediction, and data caching.
Use this book as your one-stop shop for architecting a world-class DevOps environment with Microsoft technologies. .NET DevOps for Azure is a synthesis of practices, tools, and process that, together, can equip a software organization to move fast and deliver the highest quality software. The book begins by discussing the most common challenges faced by developers in DevOps today and offers options and proven solutions on how to implement DevOps for your team. Daily, millions of developers use .NET to build and operate mission-critical software systems for organizations around the world. While the marketplace has scores of information about the technology, it is completely up to you to put together all the blocks in the right way for your environment. This book provides you with a model to build on. The relevant principles are covered first along with how to implement that part of the environment. And while variances in tools, language, or requirements will change the needed implementation, the DevOps model is the architecture for the working environment for your team. You can modify parts of the model to customize it to your enterprise, but the architecture will enable all of your teams and applications to accelerate in performance. What You Will Learn Get your .NET applications into a DevOps environment in Azure Analyze and address the part of your DevOps process that causes delays or bottlenecks Track code using Azure Repos and conduct acceptance tests Apply the rules for segmenting applications into Git repositories Understand the different types of builds and when to use each Know how to think about code validation in your DevOps environment Provision and configure environments; deploy release candidates across the environments in Azure Monitor and support software that has been deployed to a production environment Who This Book Is For .NET Developers who are using or want to use DevOps in Azure but don't know where to begin
Master vSphere automation with this comprehensive reference VMware vSphere PowerCLI Reference, Automating vSphere Administration, 2nd Edition is a one-stop solution for vSphere automation. Fully updated to align with the latest vSphere and PowerCLI release, this detailed guide shows you how to get the most out of PowerCLI's handy cmdlets using real-world examples and a practical, task-based approach. You'll learn how to store, access, update, back up, and secure massive amounts of data quickly through the power of virtualization automation, and you'll get acquainted with PowerCLI as you learn how to automate management, monitoring, and life-cycle operations for vSphere. Coverage includes areas like the PowerCLI SDK, SRM, vCOPS, and vCloud Air. Plus guidance toward scheduling and viewing automation, using DevOps methodology and structured testing and source control of your PowerCLI scripts. Clear language and detailed explanations make this reference the manual you've been looking for. This book is your complete reference for managing vSphere in a Windows environment, with expert instruction and real-world application. * Automate vCenter Server deployment and configuration * Create and configure virtual machines, and utilize vApps * Monitor, audit, and report the status of your vSphere environment * Secure, back up, and restore your virtual machines * Work with other vSphere components from your PowerCLI scripts * Take control of your PowerCLI scripts through versioning and structured testing Don't spend another day slogging through routine systems management automate it, with this invaluable guide.
This book constitutes the refereed post-conference proceedings of the 5th Russian Supercomputing Days, RuSCDays 2019, held in Moscow, Russia, in September 2019. The 60 revised full papers presented were carefully reviewed and selected from 127 submissions. The papers are organized in the following topical sections: parallel algorithms; supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing. |
![]() ![]() You may like...
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R23,944
Discovery Miles 239 440
The Mathematics of Information Coding…
George Cybenko, Dianne P O'Leary, …
Hardcover
R3,106
Discovery Miles 31 060
|