![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
The two-volume set LNCS 6852/6853 constitutes the refereed proceedings of the 17th International Euro-Par Conference held in Bordeaux, France, in August/September 2011. The 81 revised full papers presented were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load-balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and mobile ubiquitous computing.
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you. Like the popular O'Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing. Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include: * Key problems with networking * Network interface card (NIC) device drivers * System initialization * Layer 2 (link-layer) tasks and implementation * Layer 3 (IPv4) tasks and implementation * Neighbor infrastructure and protocols (ARP) * Bridging * Routing * ICMP Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.
This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.
This volume contains a selection of papers that focus on the state-of the-art in formal specification and verification of real-time computing systems. Preliminary versions of these papers were presented at a workshop on the foundations of real-time computing sponsored by the Office of Naval Research in October, 1990 in Washington, D. C. A companion volume by the title Foundations of Real-Time Computing: Scheduling and Resource Management complements this hook by addressing many of the recently devised techniques and approaches for scheduling tasks and managing resources in real-time systems. Together, these two texts provide a comprehensive snapshot of current insights into the process of designing and building real time computing systems on a scientific basis. The notion of real-time system has alternative interpretations, not all of which are intended usages in this collection of papers. Different communities of researchers variously use the term real-time to refer to either very fast computing, or immediate on-line data acquisition, or deadline-driven computing. This text is concerned with the formal specification and verification of computer software and systems whose correct performance is dependent on carefully orchestrated interactions with time, e. g., meeting deadlines and synchronizing with clocks. Such systems have been enabled for a rapidly increasing set of diverse end-uses by the unremitting advances in computing power per constant-dollar cost and per constant-unit-volume of space. End use applications of real-time computers span a spectrum that includes transportation systems, robotics and manufacturing, aerospace and defense, industrial process control, and telecommunications."
This Guide to Sun Administration is areference manual written by Sun administrators for Sun administrators. The book is not in tended to be a complete guide to UNIX Systems Administration; instead it will concentrate on the special issues that are particular to the Sun environment. It will take you through the basic steps necessary to install and maintain a network of Sun computers. Along the way, helpful ideas will be given concerning NFS, YP, backup and restore procedures, as well as many useful installation tips that can make a system administrator's job less painful. Spe cifically, SunGS 4.0 through 4.0.3 will be studied; however, many ofthe ideas and concepts presented are generic enough to be used on any version of SunGS. This book is not intended to be basic introduction to SunGS. It is assumed thatthe reader will have at least a year ofexperience supporting UNIX. BookOverview The firstchaptergives adescription ofthe system types thatwill be discussed throughout the book. An understanding of all of the system types is needed to comprehend the rest ofthe book. Chapter 2 provides the information necessary to install a workstation. The format utility and the steps involved in the suninstall process are covered in detail. Ideas and concepts about partitioning are included in this chapter. YP is the topic of the third chapter. A specific description of each YPmap and each YPcommand ispresented, along with some tips about ways to best utilize this package in your environment.
In conjunction with the 1993 International Conference on Logic Programming (ICLP'93), held in Budapest Hungary, two workshops were held concerning the implementations of logic programming systems: Practical Implementations and Sys- tems Experience in Logic Programming Systems, and Concurrent, Distributed, and Parallel Implementations of Logic Programming Systems. This collection presents 16 research papers in the area of the implementation of logic programming systems. The two workshops aimed to bring together sys- tems implementors for discussing real problems coming from their direct experience, therefore these papers have a special emphasis on practice rather than on theory. This book will be of immediate interest to practitioners who seek understanding of how to efficiently manage memory, generate fast code, perform sophisticated static analyses, and design high-performance runtime features. A major theme, throughout the papers, is how to effectively leverage host imple- mentation systems and technologies to implement target systems. Debray discusses implementing Janus in SICStus Prolog by exploiting the delay primitive, which is fur- ther expounded by Meier in his discussion of various ECRC systems implementations of delay primitives. Hausman discusses implementing Erlang in C, and Czajkowski and Zielinski discuss embedding Linda primitives in Strand. Denti et ai. discuss implementing object-oriented logic programs within SICStus Prolog, a theme also explored and compared to a WAM-based implementation by Bugliesi and Nardiello.
This book constitutes the refereed proceedings of the Fourth International Symposium on Search-Based Software Engineering, SSBSE 2012, held in Riva del Garda, Italy in collocation with the 28th IEEE International Conference on Software Maintenance. The 15 revised full papers, 3 revised short papers, and 2 papers of the graduate track presented together with 2 keynote talks and 1 tutorial paper were carefully reviewed and selected from 38 initial submissions. Search-based Software Engineering (SBSE) studies the application of meta-heuristic optimization techniques to various software engineering problems, ranging from requirements engineering to software testing and maintenance. The papers present current research in all areas of Search Based Software Engineering, including theoretical work, research on SBSE applications, empirical studies, and reports on industrial experience.
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which are short papers were carefully reviewed and selected from 24 submissions. The papers address new work on optimization of multicore software, program analysis, and automatic parallelization. They also provide new perspectives on programming models as well as on applications of multicore systems.
The iPhone is the hottest gadget of our generation, and much of its success has been fueled by the App Store, Apple's online marketplace for iPhone applications. Over 1 billion apps were downloaded during the nine months following the launch of theApp Store, ranging from the simplest games to the most complex business apps. Everyone has an idea for the next bestselling iPhone apppresumably, that's why you're reading this now And with the popularity of the iPad, this demand will just continue to grow. So how do you build an application for the iPhone and iPad? Don't you need to spend years learning complicated programming languages? What about Objective-C and Cocoa touch ? The answer is that you don't need to know any of those things Anybody can start building simple apps for the iPhone and iPad, and this book will show you how. This update of an Apress bestseller walks you through creating your first app, using plain English and practical examples using the iOS 5 software development platform and more. It cuts through the fog of jargon and misinformation that surrounds iPhone and iPad application development, and gives you simple, step-by-step instructions to get you started. Teaches iPhone and iPad apps development in language anyone can understand Provides simple, step-by-step examples that make learning easy, using iOS 5 Offers videos that enable you to follow along with the authorit's like your own private classroom What you'll learn Get both yourself and your computer set up for iPhone and iPad application development Start by making small changes to existing applications to build your knowledge and experience before creating your own applications Follow steps in plain English to build simple apps and get them working immediately Style your application so that it looks good and users can easily navigate through it Make use of the iPhone's touch screen and accelerometer Use shortcuts and cheat sheets to create apps the easy way Who this book is for If you have a great idea for an iPhone or iPad app, but have never programmed before, then this book is for you. You don't need to have any previous computer programming skills--as long as you have a desire to learn, and you know which end of the mouse is which, you'll be fine. Table of Contents Before We Get Started Blast-Off 4 Critical Programs Underneath the Hood Buttons & Labels with Multiple Graphics Switches Storyboards Debugging MapKit
This book constitutes the refereed proceedings of the Fourth International Workshop on Software Engineering for Resilient Systems, SERENE 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers were carefully reviewed and selected from numerous submissions. The papers address all aspects of fault tolerance and exception handling, safety modeling, supporting evolution, resilience in service-oriented computing, and applying formal methods in case studies.
The phenomenal success of the iPhone, iPad and the iPod touch has ushered in a gold rush for developers, but with well over 300,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iOS app requires a lot of organization and some strategic planning. Updated and expanded for iOS 4, this bestselling book will show you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store The Business of iPhone and iPad App Development was written by experienced developers with business backgrounds, taking you step-by-step through cost effective marketing techniques that have proven successful for professional iOS app creatorsperfect for independent developers on shoestring budgets. No prior business knowledge is required. This is the book you wish you had read before you launched your first app What you'll learn Analyze your ideas and competition, and identify your audience to evaluate sales potential. Protect your business and intellectual property and avoid potential legal hassles. Transform your iOS app into a powerful marketing tool. Build synergy with in-app cross-promotion and social media, and Apple's Game Center. Utilize revenue-generating business models such as in-app advertising and In-App Purchase. Includes extensive coverage of the iAd framework and the Store Kit API. Improve usability and implement effective testing. Create a pre-release buzz online with Twitter, Facebook, blogs, and a dedicated website. Successfully navigate the App Store submission process. Execute a post-release marketing strategy with press releases, app reviews, promotional sales and giveaways. Who this book is for This book is for any developer looking to build a successful business selling iPhone, iPod touch, and iPad apps in Apple's iTunes App Store. All the code examples included in this book can be downloaded fromhttp: //iphonebusinessbook.com/. Table of Contents Seeing the Big Picture in a Crowded App Store Marketplace Doing Your Homework: Analyzing iOS App Ideas and Performing Competitive Research Protecting Your Intellectual Property Your iOS App Is Your Most Powerful Marketing Tool Social Inception: Promoting Your Apps Within Apps Money for Nothing: When It Pays to Be Free Monetizing Free Apps with iAd and Other In-App Advertising Opportunities Exploring the Freemium Model with In-App Purchase Testing and Usability: Putting Your Best Foot Forward Get the Party Started Creating a Prerelease Buzz Keys to the Kingdom: The App Store Submission Process Increasing Awareness for Your iOS App Online Resources for App Research and Marketing
This book constitutes the refereed proceedings of the 7th International Conference on Grid and Pervasive Computing, GPC 2012, held in Hong Kong, China, in May 2012. The 9 revised full papers and 19 short papers were carefully revised and selected from 55 submissions. They are organized in topical sections on cloud computing, grid and service computing, green computing, mobile and pervasive computing, scheduling and performance, and trust and security. Also included are 4 papers presented at the 2012 International Workshop on Mobile Cloud and Ubiquitous Computing (Mobi-Cloud 2012) held in conjunction with GPC 2012.
Concurrent systems abound in human experience but their fully adequate conceptualization as yet eludes our most able thinkers. The COSY (ConcurrentSystem) notation and theory was developed in the last decade as one of a number of mathematical approaches for conceptualizing and analyzing concurrent and reactive systems. The COSY approach extends theconventional notions of grammar and automaton from formal language and automata theory to collections of "synchronized" grammars and automata, permitting system specification and analysis of "true" concurrency without reduction to non-determinism. COSY theory is developed to a great level of detail and constitutes the first uniform and self-contained presentationof all results about COSY published in the past, as well as including many new results. COSY theory is used to analyze a sufficient number of typical problems involving concurrency, synchronization and scheduling, to allow the reader to apply the techniques presented tosimilar problems. The COSY model is also related to many alternative models of concurrency, particularly Petri Nets, Communicating Sequential Processes and the Calculus of Communicating Systems.
This book contains the papers presented at the international research sympo sium "Solid Modeling by Computers: From Theory to Applications," held at the General Motors Research Laboratories on September 25-27, 1983. This was the 28th syposium in aseries which the Research Laboratories began sponsor ing in 1957. Each symposium has focused on a topic that is both under active study at the Research Laboratories and is also of interest to the larger technical community. Solid modeling is still a very young research area, young even when com pared with other computer-related research fields. Ten years ago, few people recognized the importance of being able to create complete and unambiguous computer models of mechanical parts. Today there is wide recognition that computer representations of solids are aprerequisite for the automation of many engineering analyses and manufacturing applications. In September 1983, the time was ripe for a symposium on this subject. Re search had already demonstrated the efficacy of solid modeling as a tool in computer automated design and manufacturing, and there were significant re suIts wh ich could be presented at the symposium. Yet the field was still young enough that we could bring together theorists in solid modeling and practition ers applying solid modeling to other research areas in a group sm all enough to allow a stimulating exchange of ideas."
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.
With Beginning Android Web Apps Development, you'll learn how to apply HTML5, CSS3, JavaScript, Ajax and other Web standards for use on the Android mobile platform, by building a variety of fun and visually stimulating games and other web applications If you've done some basic web development, and you want to build your skills to create exceptional web apps, you'll find everything you seek in the discussions and examples in this book. Each application you'll build in Beginning Android Web Application Development will show you solutions that you can apply to many of your own projects. Each example shares techniques and coding solutions that will inspire your own work. You'll learn how to tie your Android apps into Twitter through two apps that you'll build: Who's that Tweet? , a quiz game based on celebrity accounts, and I Love Ham, a coding investigation into search phrases and rhyming. Your Android web app development skills will then proceed in another direction, as you discover the power of HTML5 in two game apps: Scavenger Hunt, which introduces you to the HTML5 GPS location API, and Spies , a location-based application that shows you how to use CSS3, Ajax, and HTML5 within multi-player environments. You'll also create an Android web application which checks the arrival time of buses and light-rails through the use of Portland, Oregon's open Tri-Met data API This app is a great template for other apps you may want to build in the future, and showcases the important techniques for incorporating cloud-based apps into web games. After reading Beginning Android Web Apps Development, you will have built real apps and developed along the way the skills you'll need to create highly interactive, professional web applications...and, your journey will be engaging and enjoyable What you'll learn * Coding solutions that you can use time and again in your own Android web apps * Key methods and techniques for contemporary Android web app development * How to take full advantage of CSS3 in the mobile environment and how to handle a multitude of screen resolutions * How to build feature-rich user interfaces with navigation, colors, and professional styling * How to add audio and video for highly interactive sites * How to optimize Ajax within your site * How to access and use the HTML location API * How to integrate JavaScript and JavaScript frameworks into your site Who this book is for For anyone starting out in Android web app development who wants to build feature-rich web apps that are optimized for the Android mobile platform. If you've got basic web development skills, you'll find the code samples and discussions in this book will take your techniques to a completely different level. Table of Contents1. Harnessing the Power of Mobile Web 2. Twitter Application: Who's That Tweet? 3. Twitter Application: I Love Ham 4.Creating a Mobile Strategy and Structuring your Code 5. Handling Multiple Screen Resolutions with CSS 3 6. Handling Different Browser Platforms 7. Providing an Impressive User Experience with jQuery Mobile 8. Building Visually Rich Internet Applications 9. HTML5 Location-Based Applications 10. Using Cloud Services: A Transport Application 11. Pushing the Limits with Audio and Video 12. Ajax and Extreme User Interfaces 13. Packaging Your Applications
Mobile devices haveevolved to focus onrich media production and consumption. Developers of mobile applications are able to create applications that allow people to play, capture, andshare media in a variety of new ways on mobile devices. The popularity of Android has soared in part because the platform offers developers a rich set of capabilities including access to media capturing and playback functions. Pro Android Mediaprovides concise and clear instruction on how to utilize the media APIs made available through Android to create dynamic apps. It takes youfrom a simple means to gain access to the camera to complex video capture and sharing examples. It also covers sound, graphics, painting, and moreeverything you need to make your app come "alive." What you'll learn Develop graphics, music, video and rich media apps for Android smartphones and tablets Build touchscreen input features into Android apps that allow users to draw, paint, and do other creative forms of input Turn the Android smartphone into a full fledged media player Integrate and use location-based services and media-related web service APIs Who this book is for This book is aimed primarily at the growing market of Android developers. It is written in such a way that it may be used by those who are familiar with Android, but have no experience developing applications that deal with images, audio, or video Table of Contents Introduction to Android Imaging Building Custom Camera Applications Image Editing and Processing Graphics and Touch Events Introduction to Audio on Android Background and Networked Audio Audio Capture Audio Synthesis and Analysis Introduction to Video Advanced Video Video Capture Media Consumption and Publishing Using Web Services
With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. One current research initiative, which drew much attention to this area, is the Power Aware Computing and Communications (PAC/C) program sponsored by DARPA. Many of the chapters in this book include results from work that have been supported by the PACIC program. The performance of computer systems has been tremendously improving while the size and weight of such systems has been constantly shrinking. The capacities of batteries relative to their sizes and weights has been also improv ing but at a rate which is much slower than the rate of improvement in computer performance and the rate of shrinking in computer sizes. The relation between the power consumption of a computer system and it performance and size is a complex one which is very much dependent on the specific system and the technology used to build that system. We do not need a complex argument, however, to be convinced that energy and power, which is the rate of energy consumption, are becoming critical components in computer systems in gen eral, and portable and autonomous systems, in particular. Most of the early research on power consumption in computer systems ad dressed the issue of minimizing power in a given platform, which usually translates into minimizing energy consumption, and thus, longer battery life."
Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in rendering high-quality, high-fidelity, and cost-effective services for network service providers. Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems presents an up-to-date research status in the domain of distributed video retrieval. This professional book will include several different techniques that are in place for long duration video retrieval. An experimentally tested technology under the JINI platform, demonstrates a practical working system which serves as a feasibility study, as well as the first step in realizing such a technology.
Growing demands for the quality, safety, and security of software can only be satisfied by the rigorous application of formal methods during software design. This book methodically investigates the potential of first-order logic automated theorem provers for applications in software engineering. Illustrated by complete case studies on protocol verification, verification of security protocols, and logic-based software reuse, this book provides techniques for assessing the prover's capabilities and for selecting and developing an appropriate interface architecture.
This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell. The papers focus on the core of Brian Randell's work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell's love of maps. After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.
Lean Manufacturing has proved to be one of the most successful and most powerful production business systems over the last decades. Its application enabled many companies to make a big leap towards better utilization of resources and thus provide better service to the customers through faster response, higher quality and lowered costs. Lean is often described as "eyes for flow and eyes for muda" philosophy. It simply means that value is created only when all the resources flow through the system. If the flow is stopped no value but only costs and time are added, which is muda (Jap. waste). Since the philosophy was born at the Toyota many solutions were tailored for the high volume environment. But in turbulent, fast-changing market environment and progressing globalization, customers tend to require more customization, lower volumes and higher variety at much less cost and of better quality. This calls for adaptation of existing lean techniques and exploration of the new waste-free solutions that go far beyond manufacturing. This book brings together the opinions of a number of leading academics and researchers from around the world responding to those emerging needs. They tried to find answer to the question how to move forward from "Spaghetti World" of supply, production, distribution, sales, administration, product development, logistics, accounting, etc. Through individual chapters in this book authors present their views, approaches, concepts and developed tools. The reader will learn the key issues currently being addressed in production management research and practice throughout the world.
There is an established interest in integrating databases and programming languages. This book on Data Types and Persistence evolved from the proceedings of a workshop held at the Appin in August 1985. The purpose of the Appin workshop was to focus on these two aspects: persistence and data types, and to bring together people from various disciplines who have thought about these problems. Particular topics of"interest include the design of type systems appropriate for database work, the representation of persistent objects such as data types and modules, and the provision of orthogonal persistence and certain aspects of transactions and concurrency. The programme was broken into three sessions: morning, late afternoon and evening to allow the participants to take advantage of two beautiful days in the Scottish Highlands. The financial assistance of the Science and Engineering Research Council, the National Science Foundation and International Computers Ltd. is gratefully acknowledged. We would also like to thank Isabel Graham, Anne Donnelly and Estelle Taylor for their help in organising the workshop. Finally our thanks to Pete Bailey, Ray Carick and Dave Munro for the immense task they undertook in typesetting the book. The convergence of programming languages and databases to a coherent and consistent whole requires ideas from, and adjustment in, both intellectual camps. The first group of chapters in this book present ideas and adjustments coming from the programming language research community. This community frequently discusses types and uses them as a framework for other discussions.
The second half of the 1970s was marked with impressive advances in array/vector architectures and vectorization techniques and compilers. This progress continued with a particular focus on vector machines until the middle of the 1980s. The major ity of supercomputers during this period were register-to-register (Cray 1) or memory-to-memory (CDC Cyber 205) vector (pipelined) machines. However, the increasing demand for higher computational rates lead naturally to parallel comput ers and software. Through the replication of autonomous processors in a coordinated system, one can skip over performance barriers due technology limitations. In princi ple, parallelism offers unlimited performance potential. Nevertheless, it is very difficult to realize this performance potential in practice. So far, we have seen only the tip of the iceberg called "parallel machines and parallel programming." Parallel programming in particular is a rapidly evolving art and, at present, highly empirical. In this book we discuss several aspects of parallel programming and parallelizing compilers. Instead of trying to develop parallel programming methodologies and paradigms, we often focus on more advanced topics assuming that the reader has an adequate background in parallel processing. The book is organized in three main parts. In the first part (Chapters 1 and 2) we set the stage and focus on program transformations and parallelizing compilers. The second part of this book (Chapters 3 and 4) discusses scheduling for parallel machines from the practical point of view macro and microtasking and supporting environments). Finally, the last part (Le." |
You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,434
Discovery Miles 14 340
|