0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (6)
  • R100 - R250 (92)
  • R250 - R500 (330)
  • R500+ (2,282)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Operating Systems and Services (Paperback, Softcover reprint of the original 1st ed. 1999): Ragunathan Rajkumar Operating Systems and Services (Paperback, Softcover reprint of the original 1st ed. 1999)
Ragunathan Rajkumar
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Real-Time UNIX (R) Systems - Design and Application Guide (Paperback, Softcover reprint of the original 1st ed. 1991): Borko... Real-Time UNIX (R) Systems - Design and Application Guide (Paperback, Softcover reprint of the original 1st ed. 1991)
Borko Furht, Dan Grostick, David Gluch, Guy Rabbat, John Parker, …
R4,003 Discovery Miles 40 030 Ships in 18 - 22 working days

A growing concern of mine has been the unrealistic expectations for new computer-related technologies introduced into all kinds of organizations. Unrealistic expectations lead to disappointment, and a schizophrenic approach to the introduction of new technologies. The UNIX and real-time UNIX operating system technologies are major examples of emerging technologies with great potential benefits but unrealistic expectations. Users want to use UNIX as a common operating system throughout large segments of their organizations. A common operating system would decrease software costs by helping to provide portability and interoperability between computer systems in today's multivendor environments. Users would be able to more easily purchase new equipment and technologies and cost-effectively reuse their applications. And they could more easily connect heterogeneous equipment in different departments without having to constantly write and rewrite interfaces. On the other hand, many users in various organizations do not understand the ramifications of general-purpose versus real-time UNIX. Users tend to think of "real-time" as a way to handle exotic heart-monitoring or robotics systems. Then these users use UNIX for transaction processing and office applications and complain about its performance, robustness, and reliability. Unfortunately, the users don't realize that real-time capabilities added to UNIX can provide better performance, robustness and reliability for these non-real-time applications. Many other vendors and users do realize this, however. There are indications even now that general-purpose UNIX will go away as a separate entity. It will be replaced by a real-time UNIX. General-purpose UNIX will exist only as a subset of real-time UNIX.

Energy-Efficient High Performance Computing - Measurement and Tuning (Paperback, 2013 ed.): James H. Laros III, Kevin Pedretti,... Energy-Efficient High Performance Computing - Measurement and Tuning (Paperback, 2013 ed.)
James H. Laros III, Kevin Pedretti, Suzanne M. Kelly, Wei Shu, Kurt Ferreira, …
R1,351 Discovery Miles 13 510 Ships in 18 - 22 working days

In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, and the effects of tuning both CPU and network bandwidth. Modifications were made to deterministically halt cores when idle. Additionally, capabilities were added to alter operating P-state. At the application level, an understanding of the power requirements of a range of important DOE/NNSA production scientific computing applications running at large scale is gained by simultaneously collecting current and voltage measurements on the hosting nodes. The effects of both CPU and network bandwidth tuning are examined, and energy savings opportunities without impact on run-time performance are demonstrated. This research suggests that next-generation large-scale platforms should not only approach CPU frequency scaling differently, but could also benefit from the capability to tune other platform components to achieve more energy-efficient performance.

iPhone and iPad Apps for Absolute Beginners, iOS 5 Edition (Paperback, 2nd ed.): Rory Lewis iPhone and iPad Apps for Absolute Beginners, iOS 5 Edition (Paperback, 2nd ed.)
Rory Lewis
R791 R720 Discovery Miles 7 200 Save R71 (9%) Ships in 18 - 22 working days

The iPhone is the hottest gadget of our generation, and much of its success has been fueled by the App Store, Apple's online marketplace for iPhone applications. Over 1 billion apps were downloaded during the nine months following the launch of theApp Store, ranging from the simplest games to the most complex business apps. Everyone has an idea for the next bestselling iPhone apppresumably, that's why you're reading this now And with the popularity of the iPad, this demand will just continue to grow. So how do you build an application for the iPhone and iPad? Don't you need to spend years learning complicated programming languages? What about Objective-C and Cocoa touch ? The answer is that you don't need to know any of those things Anybody can start building simple apps for the iPhone and iPad, and this book will show you how. This update of an Apress bestseller walks you through creating your first app, using plain English and practical examples using the iOS 5 software development platform and more. It cuts through the fog of jargon and misinformation that surrounds iPhone and iPad application development, and gives you simple, step-by-step instructions to get you started. Teaches iPhone and iPad apps development in language anyone can understand Provides simple, step-by-step examples that make learning easy, using iOS 5 Offers videos that enable you to follow along with the authorit's like your own private classroom What you'll learn Get both yourself and your computer set up for iPhone and iPad application development Start by making small changes to existing applications to build your knowledge and experience before creating your own applications Follow steps in plain English to build simple apps and get them working immediately Style your application so that it looks good and users can easily navigate through it Make use of the iPhone's touch screen and accelerometer Use shortcuts and cheat sheets to create apps the easy way Who this book is for

If you have a great idea for an iPhone or iPad app, but have never programmed before, then this book is for you. You don't need to have any previous computer programming skills--as long as you have a desire to learn, and you know which end of the mouse is which, you'll be fine. Table of Contents Before We Get Started Blast-Off 4 Critical Programs Underneath the Hood Buttons & Labels with Multiple Graphics Switches Storyboards Debugging MapKit

Software Engineering for Resilient Systems - Fourth International Workshop, SERENE 2012, Pisa, Italy, September 27-28, 2012,... Software Engineering for Resilient Systems - Fourth International Workshop, SERENE 2012, Pisa, Italy, September 27-28, 2012, Proceedings (Paperback, 2012 ed.)
Paris Avgeriou
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Fourth International Workshop on Software Engineering for Resilient Systems, SERENE 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers were carefully reviewed and selected from numerous submissions. The papers address all aspects of fault tolerance and exception handling, safety modeling, supporting evolution, resilience in service-oriented computing, and applying formal methods in case studies.

The Business of iPhone and iPad App Development - Making and Marketing Apps that Succeed (Paperback, 2nd ed.): Dave Wooldridge,... The Business of iPhone and iPad App Development - Making and Marketing Apps that Succeed (Paperback, 2nd ed.)
Dave Wooldridge, Michael Schneider
R940 R819 Discovery Miles 8 190 Save R121 (13%) Ships in 18 - 22 working days

The phenomenal success of the iPhone, iPad and the iPod touch has ushered in a gold rush for developers, but with well over 300,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iOS app requires a lot of organization and some strategic planning. Updated and expanded for iOS 4, this bestselling book will show you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store The Business of iPhone and iPad App Development was written by experienced developers with business backgrounds, taking you step-by-step through cost effective marketing techniques that have proven successful for professional iOS app creatorsperfect for independent developers on shoestring budgets. No prior business knowledge is required. This is the book you wish you had read before you launched your first app What you'll learn Analyze your ideas and competition, and identify your audience to evaluate sales potential. Protect your business and intellectual property and avoid potential legal hassles. Transform your iOS app into a powerful marketing tool. Build synergy with in-app cross-promotion and social media, and Apple's Game Center. Utilize revenue-generating business models such as in-app advertising and In-App Purchase. Includes extensive coverage of the iAd framework and the Store Kit API. Improve usability and implement effective testing. Create a pre-release buzz online with Twitter, Facebook, blogs, and a dedicated website. Successfully navigate the App Store submission process. Execute a post-release marketing strategy with press releases, app reviews, promotional sales and giveaways. Who this book is for

This book is for any developer looking to build a successful business selling iPhone, iPod touch, and iPad apps in Apple's iTunes App Store. All the code examples included in this book can be downloaded fromhttp: //iphonebusinessbook.com/. Table of Contents Seeing the Big Picture in a Crowded App Store Marketplace Doing Your Homework: Analyzing iOS App Ideas and Performing Competitive Research Protecting Your Intellectual Property Your iOS App Is Your Most Powerful Marketing Tool Social Inception: Promoting Your Apps Within Apps Money for Nothing: When It Pays to Be Free Monetizing Free Apps with iAd and Other In-App Advertising Opportunities Exploring the Freemium Model with In-App Purchase Testing and Usability: Putting Your Best Foot Forward Get the Party Started Creating a Prerelease Buzz Keys to the Kingdom: The App Store Submission Process Increasing Awareness for Your iOS App Online Resources for App Research and Marketing

Predictably Dependable Computing Systems (Paperback, Softcover reprint of the original 1st ed. 1995): Brian Randell, Jean... Predictably Dependable Computing Systems (Paperback, Softcover reprint of the original 1st ed. 1995)
Brian Randell, Jean Claude Laprie, Hermann Kopetz, Bev Littlewood
R2,736 Discovery Miles 27 360 Ships in 18 - 22 working days

The first ESPRIT Basic Research Project on Predictably Dependable Computing Systems (No. 3092, PDCS) commenced in May 1989, and ran until March 1992. The institutions and principal investigators that were involved in PDCS were: City University, London, UK (Bev Littlewood), lEI del CNR, Pisa, Italy (Lorenzo Strigini), Universitiit Karlsruhe, Germany (Tom Beth), LAAS-CNRS, Toulouse, France (Jean-Claude Laprie), University of Newcastle upon Tyne, UK (Brian Randell), LRI-CNRS/Universite Paris-Sud, France (Marie-Claude Gaudel), Technische Universitiit Wien, Austria (Hermann Kopetz), and University of York, UK (John McDermid). The work continued after March 1992, and a three-year successor project (No. 6362, PDCS2) officially started in August 1992, with a slightly changed membership: Chalmers University of Technology, Goteborg, Sweden (Erland Jonsson), City University, London, UK (Bev Littlewood), CNR, Pisa, Italy (Lorenzo Strigini), LAAS-CNRS, Toulouse, France (Jean-Claude Laprie), Universite Catholique de Louvain, Belgium (Pierre-Jacques Courtois), University of Newcastle upon Tyne, UK (Brian Randell), LRI-CNRS/Universite Paris-Sud, France (Marie-Claude Gaudel), Technische Universitiit Wien, Austria (Hermann Kopetz), and University of York, UK (John McDermid). The summary objective of both projects has been "to contribute to making the process of designing and constructing dependable computing systems much more predictable and cost-effective." In the case of PDCS2, the concentration has been on the problems of producing dependable distributed real-time systems and especially those where the dependability requirements centre on issues of safety and/or security.

Solid Modeling by Computers - From Theory to Applications (Paperback, Softcover reprint of the original 1st ed. 1984): Mary S.... Solid Modeling by Computers - From Theory to Applications (Paperback, Softcover reprint of the original 1st ed. 1984)
Mary S. Pickett, John W. Boyse
R1,463 Discovery Miles 14 630 Ships in 18 - 22 working days

This book contains the papers presented at the international research sympo sium "Solid Modeling by Computers: From Theory to Applications," held at the General Motors Research Laboratories on September 25-27, 1983. This was the 28th syposium in aseries which the Research Laboratories began sponsor ing in 1957. Each symposium has focused on a topic that is both under active study at the Research Laboratories and is also of interest to the larger technical community. Solid modeling is still a very young research area, young even when com pared with other computer-related research fields. Ten years ago, few people recognized the importance of being able to create complete and unambiguous computer models of mechanical parts. Today there is wide recognition that computer representations of solids are aprerequisite for the automation of many engineering analyses and manufacturing applications. In September 1983, the time was ripe for a symposium on this subject. Re search had already demonstrated the efficacy of solid modeling as a tool in computer automated design and manufacturing, and there were significant re suIts wh ich could be presented at the symposium. Yet the field was still young enough that we could bring together theorists in solid modeling and practition ers applying solid modeling to other research areas in a group sm all enough to allow a stimulating exchange of ideas."

Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International... Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers (Paperback, Edition.)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.

Pro Android Media - Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets (Paperback, 1st ed.):... Pro Android Media - Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets (Paperback, 1st ed.)
Shawn Van Every
R1,014 R868 Discovery Miles 8 680 Save R146 (14%) Ships in 18 - 22 working days

Mobile devices haveevolved to focus onrich media production and consumption. Developers of mobile applications are able to create applications that allow people to play, capture, andshare media in a variety of new ways on mobile devices. The popularity of Android has soared in part because the platform offers developers a rich set of capabilities including access to media capturing and playback functions. Pro Android Mediaprovides concise and clear instruction on how to utilize the media APIs made available through Android to create dynamic apps. It takes youfrom a simple means to gain access to the camera to complex video capture and sharing examples. It also covers sound, graphics, painting, and moreeverything you need to make your app come "alive." What you'll learn Develop graphics, music, video and rich media apps for Android smartphones and tablets Build touchscreen input features into Android apps that allow users to draw, paint, and do other creative forms of input Turn the Android smartphone into a full fledged media player Integrate and use location-based services and media-related web service APIs Who this book is for

This book is aimed primarily at the growing market of Android developers. It is written in such a way that it may be used by those who are familiar with Android, but have no experience developing applications that deal with images, audio, or video Table of Contents Introduction to Android Imaging Building Custom Camera Applications Image Editing and Processing Graphics and Touch Events Introduction to Audio on Android Background and Networked Audio Audio Capture Audio Synthesis and Analysis Introduction to Video Advanced Video Video Capture Media Consumption and Publishing Using Web Services

Architecture of Computing Systems - ARCS 2012 - 25th International Conference, Munich, Germany, February 28 - March 2, 2012.... Architecture of Computing Systems - ARCS 2012 - 25th International Conference, Munich, Germany, February 28 - March 2, 2012. Proceedings (Paperback, 2012)
Andreas Herkersdorf, Kay Roemer, Uwe Brinkschulte
R1,400 Discovery Miles 14 000 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 25th International Conference on Architecture of Computing Systems, ARCS 2012, held in Munich, Germany, in February/March 2012. The 20 revised full papers presented in 7 technical sessions were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on robustness and fault tolerance, power-aware processing, parallel processing, processor cores, optimization, and communication and memory.

Network Synthesis Problems (Paperback, Softcover reprint of hardcover 1st ed. 2001): C. Wynants Network Synthesis Problems (Paperback, Softcover reprint of hardcover 1st ed. 2001)
C. Wynants
R2,635 Discovery Miles 26 350 Ships in 18 - 22 working days

As the telecommunication industry introduces new sophisticated technologies, the nature of services and the volume of demands have changed. Indeed, a broad range of new services for users appear, combining voice, data, graphics, video, etc. This implies new planning issues. Fiber transmission systems that can carry large amounts of data on a few strands of wire were introduced. These systems have such a large bandwidth that the failure of even a single transmission link: in the network can create a severe service loss to customers. Therefore, a very high level of service reliability is becoming imperative for both system users and service providers. Since equipment failures and accidents cannot be avoided entirely, networks have to be designed so as to "survive" failures. This is done by judiciously installing spare capacity over the network so that all traffic interrupted by a failure may be diverted around that failure by way of this spare or reserve capacity. This of course translates into huge investments for network operators. Designing such survivable networks while minimizing spare capacity costs is, not surprisingly, a major concern of operating companies which gives rise to very difficult combinatorial problems. In order to make telecommunication networks survivable, one can essentially use two different strategies: protection or restoration. The protection approach preas signs spare capacity to protect each element of the network independently, while the restoration approach spreads the redundant capacity over the whole network and uses it as required in order to restore the disrupted traffic."

Parallel Machines: Parallel Machine Languages - The Emergence of Hybrid Dataflow Computer Architectures (Paperback, Softcover... Parallel Machines: Parallel Machine Languages - The Emergence of Hybrid Dataflow Computer Architectures (Paperback, Softcover reprint of the original 1st ed. 1990)
Robert A. Iannucci
R3,995 Discovery Miles 39 950 Ships in 18 - 22 working days

It is universally accepted today that parallel processing is here to stay but that software for parallel machines is still difficult to develop. However, there is little recognition of the fact that changes in processor architecture can significantly ease the development of software. In the seventies the availability of processors that could address a large name space directly, eliminated the problem of name management at one level and paved the way for the routine development of large programs. Similarly, today, processor architectures that can facilitate cheap synchronization and provide a global address space can simplify compiler development for parallel machines. If the cost of synchronization remains high, the pro gramming of parallel machines will remain significantly less abstract than programming sequential machines. In this monograph Bob Iannucci presents the design and analysis of an architecture that can be a better building block for parallel machines than any von Neumann processor. There is another very interesting motivation behind this work. It is rooted in the long and venerable history of dataflow graphs as a formalism for ex pressing parallel computation. The field has bloomed since 1974, when Dennis and Misunas proposed a truly novel architecture using dataflow graphs as the parallel machine language. The novelty and elegance of dataflow architectures has, however, also kept us from asking the real question: "What can dataflow architectures buy us that von Neumann ar chitectures can't?" In the following I explain in a round about way how Bob and I arrived at this question."

Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems (Paperback, Softcover reprint of hardcover 1st... Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Bharadwaj Veeravalli, Gerassimos Barlas
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in rendering high-quality, high-fidelity, and cost-effective services for network service providers.

Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems presents an up-to-date research status in the domain of distributed video retrieval. This professional book will include several different techniques that are in place for long duration video retrieval. An experimentally tested technology under the JINI platform, demonstrates a practical working system which serves as a feasibility study, as well as the first step in realizing such a technology.

Automated Theorem Proving in Software Engineering (Paperback, Softcover reprint of hardcover 1st ed. 2001): D. Loveland Automated Theorem Proving in Software Engineering (Paperback, Softcover reprint of hardcover 1st ed. 2001)
D. Loveland; Johann M. Schumann
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Growing demands for the quality, safety, and security of software can only be satisfied by the rigorous application of formal methods during software design. This book methodically investigates the potential of first-order logic automated theorem provers for applications in software engineering. Illustrated by complete case studies on protocol verification, verification of security protocols, and logic-based software reuse, this book provides techniques for assessing the prover's capabilities and for selecting and developing an appropriate interface architecture.

Data Types and Persistence (Paperback, Softcover reprint of the original 1st ed. 1988): Malcolm P. Atkinson, Peter Buneman,... Data Types and Persistence (Paperback, Softcover reprint of the original 1st ed. 1988)
Malcolm P. Atkinson, Peter Buneman, Ronald Morrison
R2,658 Discovery Miles 26 580 Ships in 18 - 22 working days

There is an established interest in integrating databases and programming languages. This book on Data Types and Persistence evolved from the proceedings of a workshop held at the Appin in August 1985. The purpose of the Appin workshop was to focus on these two aspects: persistence and data types, and to bring together people from various disciplines who have thought about these problems. Particular topics of"interest include the design of type systems appropriate for database work, the representation of persistent objects such as data types and modules, and the provision of orthogonal persistence and certain aspects of transactions and concurrency. The programme was broken into three sessions: morning, late afternoon and evening to allow the participants to take advantage of two beautiful days in the Scottish Highlands. The financial assistance of the Science and Engineering Research Council, the National Science Foundation and International Computers Ltd. is gratefully acknowledged. We would also like to thank Isabel Graham, Anne Donnelly and Estelle Taylor for their help in organising the workshop. Finally our thanks to Pete Bailey, Ray Carick and Dave Munro for the immense task they undertook in typesetting the book. The convergence of programming languages and databases to a coherent and consistent whole requires ideas from, and adjustment in, both intellectual camps. The first group of chapters in this book present ideas and adjustments coming from the programming language research community. This community frequently discusses types and uses them as a framework for other discussions.

Lean Business Systems and Beyond - First IFIP TC 5 Advanced Production Management Systems Conference (APMS'2006), Wroclaw,... Lean Business Systems and Beyond - First IFIP TC 5 Advanced Production Management Systems Conference (APMS'2006), Wroclaw, Poland, September 18-20, 2006 (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Tomasz Koch
R4,071 Discovery Miles 40 710 Ships in 18 - 22 working days

Lean Manufacturing has proved to be one of the most successful and most powerful production business systems over the last decades. Its application enabled many companies to make a big leap towards better utilization of resources and thus provide better service to the customers through faster response, higher quality and lowered costs. Lean is often described as "eyes for flow and eyes for muda" philosophy. It simply means that value is created only when all the resources flow through the system. If the flow is stopped no value but only costs and time are added, which is muda (Jap. waste). Since the philosophy was born at the Toyota many solutions were tailored for the high volume environment. But in turbulent, fast-changing market environment and progressing globalization, customers tend to require more customization, lower volumes and higher variety at much less cost and of better quality. This calls for adaptation of existing lean techniques and exploration of the new waste-free solutions that go far beyond manufacturing. This book brings together the opinions of a number of leading academics and researchers from around the world responding to those emerging needs. They tried to find answer to the question how to move forward from "Spaghetti World" of supply, production, distribution, sales, administration, product development, logistics, accounting, etc. Through individual chapters in this book authors present their views, approaches, concepts and developed tools. The reader will learn the key issues currently being addressed in production management research and practice throughout the world.

Parallel Programming and Compilers (Paperback, Softcover reprint of the original 1st ed. 1988): Constantine D. Polychronopoulos Parallel Programming and Compilers (Paperback, Softcover reprint of the original 1st ed. 1988)
Constantine D. Polychronopoulos
R1,395 Discovery Miles 13 950 Ships in 18 - 22 working days

The second half of the 1970s was marked with impressive advances in array/vector architectures and vectorization techniques and compilers. This progress continued with a particular focus on vector machines until the middle of the 1980s. The major ity of supercomputers during this period were register-to-register (Cray 1) or memory-to-memory (CDC Cyber 205) vector (pipelined) machines. However, the increasing demand for higher computational rates lead naturally to parallel comput ers and software. Through the replication of autonomous processors in a coordinated system, one can skip over performance barriers due technology limitations. In princi ple, parallelism offers unlimited performance potential. Nevertheless, it is very difficult to realize this performance potential in practice. So far, we have seen only the tip of the iceberg called "parallel machines and parallel programming." Parallel programming in particular is a rapidly evolving art and, at present, highly empirical. In this book we discuss several aspects of parallel programming and parallelizing compilers. Instead of trying to develop parallel programming methodologies and paradigms, we often focus on more advanced topics assuming that the reader has an adequate background in parallel processing. The book is organized in three main parts. In the first part (Chapters 1 and 2) we set the stage and focus on program transformations and parallelizing compilers. The second part of this book (Chapters 3 and 4) discusses scheduling for parallel machines from the practical point of view macro and microtasking and supporting environments). Finally, the last part (Le."

NASA Formal Methods - 4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012, Proceedings (Paperback, 2012):... NASA Formal Methods - 4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012, Proceedings (Paperback, 2012)
Alwyn Goodloe, Suzette Person
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Fourth International Symposium on NASA Formal Methods, NFM 2012, held in Norfolk, VA, USA, in April 2012. The 36 revised regular papers presented together with 10 short papers, 3 invited talks were carefully reviewed and selected from 93 submissions. The topics are organized in topical sections on theorem proving, symbolic execution, model-based engineering, real-time and stochastic systems, model checking, abstraction and abstraction refinement, compositional verification techniques, static and dynamic analysis techniques, fault protection, cyber security, specification formalisms, requirements analysis and applications of formal techniques.

Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011 and 4th International... Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers (Paperback, 2012)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina de Capitani di Vimercati
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.

Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011,... Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011, Proceedings, Part I (Paperback, 2011 ed.)
Emmanuel Jeannot, Raymond Namyst, Jean Roman
R1,498 Discovery Miles 14 980 Ships in 18 - 22 working days

The two-volume set LNCS 6852/6853 constitutes the refereed proceedings of the 17th International Euro-Par Conference held in Bordeaux, France, in August/September 2011. The 81 revised full papers presented were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load-balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and mobile ubiquitous computing.

Fast, Efficient and Predictable Memory Accesses - Optimization Algorithms for Memory Architecture Aware Compilation (Paperback,... Fast, Efficient and Predictable Memory Accesses - Optimization Algorithms for Memory Architecture Aware Compilation (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Lars Wehmeyer, Peter Marwedel
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The memory system is increasingly turning into a bottleneck in the design of embedded systems. The speed improvements of memory systems are lower than the speed improvements of processors, eventually leading to embedded systems whose performance is limited by the memory. This problem is known as the "memory wall" problem. Furthermore, memory systems may consume the largest share of the system s energy budget and may be the source of unpredictable timing behaviour. Hence, the design of the memory system deserves an increasing amount of attention.

Fast, Efficient and Predictable Memory Accesses presents techniques for designing fast, energy-efficient and timing predictable memory systems. By using a careful combination of compiler optimizations and architectural improvements, we can achieve more than what would be feasible at one of the levels in isolation. The described optimization algorithms achieve the goals of high performance and low energy consumption. In addition to these benefits, the use of scratchpad memories significantly improves the timing predictability of the entire system, leading to tighter worst case execution time bounds (WCET). The WCET is a relevant design parameter for all timing critical systems. In addition, the book covers algorithms to exploit the power down modes of main memories in SDRAM technology, as well as the execute-in-place feature of Flash memories. The final chapter considers the impact of the register file, which is also part of the memory hierarchy."

Synchronous Programming of Reactive Systems (Paperback, Softcover reprint of hardcover 1st ed. 1993): Nicolas Halbwachs Synchronous Programming of Reactive Systems (Paperback, Softcover reprint of hardcover 1st ed. 1993)
Nicolas Halbwachs
R1,380 Discovery Miles 13 800 Ships in 18 - 22 working days

This book will attempt to give a first synthesis of recent works con cerning reactive system design. The term "reactive system" has been introduced in order to at'oid the ambiguities often associated with by the term "real-time system," which, although best known and more sugges tive, has been given so many different meanings that it is almost in evitably misunderstood. Industrial process control systems, transporta tion control and supervision systems, signal-processing systems, are ex amples of the systems we have in mind. Although these systems are more and more computerized, it is sur prising to notice that the problem of time in computer science has been studied only recently by "pure" computer scientists. Until the early 1980s, time problems were regarded as the concern of performance evalu ation, or of some (unjustly scorned) "industrial computer engineering," or, at best, of operating systems. A second surprising fact, in contrast, is the growth of research con cerning timed systems during the last decade. The handling of time has suddenly become a fundamental goal for most models of concurrency. In particular, Robin Alilner 's pioneering works about synchronous process algebras gave rise to a school of thought adopting the following abstract point of view: As soon as one admits that a system can instantaneously react to events, i. e."

Grid Computing Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Anirban Chakrabarti Grid Computing Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Anirban Chakrabarti
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. It discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students.

Moving Wearables into the Mainstream - Taming the Borg (Paperback, Softcover reprint of hardcover 1st ed. 2008): Joseph L.... Moving Wearables into the Mainstream - Taming the Borg (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Joseph L. Dvorak
R2,887 Discovery Miles 28 870 Ships in 18 - 22 working days

The term Wearable Technology encompasses a wide spectrum of devices, services and systems for wireless communications and the web. This book discusses characteristics and design elements required for wearable devices and systems to be embraced by the mainstream population for use in their everyday lives, introducing concepts such as Operational Inertia. The book discusses social and legal issues that may pose the greatest impediment to adoption of wearables. The book is structured to meet the needs of researchers and practitioners in industry, and can also be used as a secondary text in advanced-level courses in computer science and electrical engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hogwarts Legacy
R1,199 R603 Discovery Miles 6 030
Assassin's Creed Unity
Blu-ray disc  (4)
R413 Discovery Miles 4 130
Terminator 2D: No Fate - Day One Edition
R1,257 R999 Discovery Miles 9 990
LEGO Jurassic World
R570 Discovery Miles 5 700
Grand Theft Auto V
R530 Discovery Miles 5 300
R-Type Final 3 Evolved Deluxe Edition…
R1,008 Discovery Miles 10 080
World War Z: Aftermath
R934 R370 Discovery Miles 3 700
Labyrinth of Refrain: Coven of Dusk
R1,392 R991 Discovery Miles 9 910
Assassin's Creed: The Ezio Collection
 (7)
R979 R413 Discovery Miles 4 130
Mortal Kombat 1
R1,299 R686 Discovery Miles 6 860

 

Partners