0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (138)
  • R250 - R500 (469)
  • R500+ (2,452)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Forensics in Telecommunications, Information and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai,... Forensics in Telecommunications, Information and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers (Paperback, 2011 ed.)
Xuejia Lai, Dawu Gu, Bo Jin, Yong Wang, Hui Li
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.

Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback,... Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback, Edition.)
Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe
R1,820 Discovery Miles 18 200 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011,... Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings (Paperback, Edition.)
Udaya Parampalli, Philip Hawkes
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011,... Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011, Proceedings, Part I (Paperback, 2011 ed.)
Emmanuel Jeannot, Raymond Namyst, Jean Roman
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

The two-volume set LNCS 6852/6853 constitutes the refereed proceedings of the 17th International Euro-Par Conference held in Bordeaux, France, in August/September 2011. The 81 revised full papers presented were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load-balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and mobile ubiquitous computing.

NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011, Proceedings (Paperback,... NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011, Proceedings (Paperback, Edition.)
Mihaela Bobaru, Klaus Havelund, Gerard Holzmann, Rajeev Joshi
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Symposium on NASA Formal Methods, NFM 2011, held in Pasadena, CA, USA, in April 2011.
The 26 revised full papers presented together with 12 tool papers, 3 invited talks, and 2 invited tutorials were carefully reviewed and selected from 141 submissions. The topics covered by NFM 2011 included but were not limited to: theorem proving, logic model checking, automated testing and simulation, model-based engineering, real-time and stochastic systems, SAT and SMT solvers, symbolic execution, abstraction and abstraction refinement, compositional verification techniques; static and dynamic analysis techniques, fault protection, cyber security, specification formalisms, requirements analysis, and applications of formal techniques.

The Business of iPhone and iPad App Development - Making and Marketing Apps that Succeed (Paperback, 2nd ed.): Dave Wooldridge,... The Business of iPhone and iPad App Development - Making and Marketing Apps that Succeed (Paperback, 2nd ed.)
Dave Wooldridge, Michael Schneider
R1,021 R846 Discovery Miles 8 460 Save R175 (17%) Ships in 10 - 15 working days

The phenomenal success of the iPhone, iPad and the iPod touch has ushered in a gold rush for developers, but with well over 300,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iOS app requires a lot of organization and some strategic planning. Updated and expanded for iOS 4, this bestselling book will show you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store The Business of iPhone and iPad App Development was written by experienced developers with business backgrounds, taking you step-by-step through cost effective marketing techniques that have proven successful for professional iOS app creatorsperfect for independent developers on shoestring budgets. No prior business knowledge is required. This is the book you wish you had read before you launched your first app What you'll learn Analyze your ideas and competition, and identify your audience to evaluate sales potential. Protect your business and intellectual property and avoid potential legal hassles. Transform your iOS app into a powerful marketing tool. Build synergy with in-app cross-promotion and social media, and Apple's Game Center. Utilize revenue-generating business models such as in-app advertising and In-App Purchase. Includes extensive coverage of the iAd framework and the Store Kit API. Improve usability and implement effective testing. Create a pre-release buzz online with Twitter, Facebook, blogs, and a dedicated website. Successfully navigate the App Store submission process. Execute a post-release marketing strategy with press releases, app reviews, promotional sales and giveaways. Who this book is for

This book is for any developer looking to build a successful business selling iPhone, iPod touch, and iPad apps in Apple's iTunes App Store. All the code examples included in this book can be downloaded fromhttp: //iphonebusinessbook.com/. Table of Contents Seeing the Big Picture in a Crowded App Store Marketplace Doing Your Homework: Analyzing iOS App Ideas and Performing Competitive Research Protecting Your Intellectual Property Your iOS App Is Your Most Powerful Marketing Tool Social Inception: Promoting Your Apps Within Apps Money for Nothing: When It Pays to Be Free Monetizing Free Apps with iAd and Other In-App Advertising Opportunities Exploring the Freemium Model with In-App Purchase Testing and Usability: Putting Your Best Foot Forward Get the Party Started Creating a Prerelease Buzz Keys to the Kingdom: The App Store Submission Process Increasing Awareness for Your iOS App Online Resources for App Research and Marketing

Pro Objective-C Design Patterns for iOS (Paperback, 1st ed.): Carlo Chung Pro Objective-C Design Patterns for iOS (Paperback, 1st ed.)
Carlo Chung
R1,335 R1,073 Discovery Miles 10 730 Save R262 (20%) Ships in 10 - 15 working days

It's time to capitalize on your mastery of Cocoa withPro Objective-C Design Patterns for iOS.You've developed apps that impressed and performed, and now you're ready to jump into development practices that will leave you with more effective, efficient, and professional level apps.This book is the element you need to make the jump from journeyman to master. All too often, developers grind through building good apps on willpower and a vigorous focus on code development, leaving them unaware of and unable to benefit from the underlying structural and functional design patterns. Pro Objective-C Design Patterns for iOS will teach you those design patterns that have always been present at some level in your code, but were never recognized, acknowledged, or fully utilized.Implementation of specific pattern approaches will prove their value to any developer working in the iOS application arena. You'll learn to master classic patterns like singleton, abstract factory, chain of responsibility, and observer. You'll also discover less well-known but useful patterns like memento, composite, command, and mediator. What you'll learn The basic concepts ofvarious design patterns How to apply designpatterns to your code based on different scenarios How design patterns canstrengthen your apps Who this book is for

Any professional or aspiring iOS developer will find productivity, efficiency, and effectiveness of software development enhanced by the methods and practice delivered byPro Objective-C Design Patterns for iOS. Table of Contents Hello, Design Patterns A Case Study: Designing an App Prototype Factory Method Abstract Factory Builder Singleton Adapter Bridge Facade Mediator Observer Composite Iterator Visitor Decorator Chain of Responsibility Template Method Strategy Command Flyweight Proxy Memento

Pro Core Data for iOS - Data Access and Persistence Engine for iPhone, iPad, and iPod touch (Paperback, 1st ed.): Michael... Pro Core Data for iOS - Data Access and Persistence Engine for iPhone, iPad, and iPod touch (Paperback, 1st ed.)
Michael Privat, Robert Warner
R1,021 R847 Discovery Miles 8 470 Save R174 (17%) Ships in 10 - 15 working days

The power of Core Data allows iOS developers to efficiently store and retrieve application data using familiar object-oriented paradigms.Pro Core Data for iOS explains both how and why to use Core Data for data storage, from simple to advanced techniques. Covering common and advanced persistence patterns, this book prepares any iOS developer to store and retrieve data accurately and proficiently.
Lots of iOS development books touch on Core Data, taking you through a few mainstream use cases for storing and retrieving data in your iOS applications. In Pro Core Data for iOS, however, we take you further into Core Data and show you how to leverage the power of this data framework.
After reading this book, you'll be able to answer all of these questions:
What are all the parts of Core Data, and how do they interact? How do I create my own custom store? Should I use plain NSManagedObject instances or custom classes? How do I undo and redo Core Data actions? How do I filter, sort, and aggregate data? What is faulting, and why should I care? Suppose I want to change my data model; how do I migrate my users' data? Pro Core Data for iOS delves into these and other Core Data questions. With explanations, diagrams, code samples, and working explanations, this book will make you a Core Data pro What you'll learn Organize data appropriately Persist data efficiently Use Apple's tools effectively Build Core Data applications Use Core Data in advanced settings Version and migrate data as your applications evolve Who this book is for

All iPhone, iPad, and iPod touch developers whose applications manage any amount of data. Table of Contents Getting Started Understanding Core Data Storing Data: SQLite and Other Options Creating a Data Model Working with Data Objects Refining Result Sets Tuning Performance and Memory Usage Versioning and Migrating Data Using Core Data in Advanced Applications

Compiling with Continuations (Paperback, Revised): Andrew W. Appel Compiling with Continuations (Paperback, Revised)
Andrew W. Appel
R2,271 Discovery Miles 22 710 Ships in 12 - 17 working days

The control and data flow of a program can be represented using continuations, a concept from denotational semantics that has practical application in real compilers. This book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. Continuations can be used to compile most programming languages. The method is illustrated in a compiler for the programming language Standard ML. However, prior knowledge of ML is not necessary, as the author carefully explains each concept as it arises. This is the first book to show how concepts from the theory of programming languages can be applied to the producton of practical optimising compilers for modern languages like ML. This book will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.

Mac Programming for Absolute Beginners (Paperback, 1st ed.): Wallace Wang Mac Programming for Absolute Beginners (Paperback, 1st ed.)
Wallace Wang
R1,028 R854 Discovery Miles 8 540 Save R174 (17%) Ships in 10 - 15 working days

Want to learn how to program on your Mac? Not sure where to begin? Best-selling author Wallace Wang will explain how to get started with Cocoa, Objective-C, and Xcode. Whether you are an experienced Windows coder moving to the Mac, or you are completely new to programming, you'll see how the basic design of a Mac OS X program works, how Objective-C differs from other languages you may have used, and how to use the Xcode development environment. Most importantly, you'll learn how to use elements of the Cocoa framework to create windows, store data, and respond to users in your own Mac programs. If you want to learn how to develop apps with Cocoa, Objective-C, and Xcode, this book is a great first step. Here are just a few of the things you'll master along the way: Fundamental programming concepts aided by short, easy-to-understand examples How to use Xcode and related programming tools to save time and work more efficiently A firm understanding of the basics of Objective-C and how it compares to other languages you might know How to create simple apps using the Cocoa framework How to easily design, write, test, and market your finished program What you'll learn Basic programming concepts illustrated with short, easy-to-understand examples How to use Xcode and related programming tools The basics of Objective-C and how it compares to other languages you might know How to create simple apps using the Cocoa framework Who this book is for

Mac users who want to learn programming or Windows developers who are moving to the Mac OS and iOS platforms. No previous programming experience required. Table of Contents Understanding Programming Understanding Apple's Programming Tools The Basic Steps to Creating a Mac Program Getting Help Learning Objective-C Making Decisions with Branches Repeating Code with Loops Understanding the Cocoa Framework Manipulating Strings Arrays Dictionaries and Sets Creating Classes and Objects Inheritance, Method Overriding, and Events Creating a User Interface Choosing Commands with Buttons Making Choices with Radio Buttons and Check Boxes Making Choices with Pop-Up Buttons Inputting and Outputting Data with Labels, Text Fields, and Combo Boxes Inputting Data with Sliders, Date Pickers, and Steppers Using Built-In Dialog Boxes Creating Pull-Down Menus Designing Your Own Programs Working with Xcode Debugging Your Program

Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International... Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers (Paperback, Edition.)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre
R1,463 Discovery Miles 14 630 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.

iOS Forensic Analysis - for iPhone, iPad, and iPod touch (Paperback, 1st ed.): Sean Morrissey, Tony Campbell iOS Forensic Analysis - for iPhone, iPad, and iPod touch (Paperback, 1st ed.)
Sean Morrissey, Tony Campbell
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community. -->What you'll learn-->How to respond to security incidents involving iOS devices How to acquire and analyze data on iOS devices such as iPhone and iPad How to analyze media exploitation on iOS devices-->Who this book is for-->

Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators-->-->-->Table of Contents-->History of Apple Mobile Devices iOS Operating and File System Analysis Search, Seizure, and Incident Response iPhone Logical Acquisition Logical Data Analysis Mac and Windows Artifacts GPS Analysis Media Exploitation Media Exploitation Analysis Network Analysis

Pro Android Media - Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets (Paperback, 1st ed.):... Pro Android Media - Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets (Paperback, 1st ed.)
Shawn Van Every
R1,101 R898 Discovery Miles 8 980 Save R203 (18%) Ships in 10 - 15 working days

Mobile devices haveevolved to focus onrich media production and consumption. Developers of mobile applications are able to create applications that allow people to play, capture, andshare media in a variety of new ways on mobile devices. The popularity of Android has soared in part because the platform offers developers a rich set of capabilities including access to media capturing and playback functions. Pro Android Mediaprovides concise and clear instruction on how to utilize the media APIs made available through Android to create dynamic apps. It takes youfrom a simple means to gain access to the camera to complex video capture and sharing examples. It also covers sound, graphics, painting, and moreeverything you need to make your app come "alive." What you'll learn Develop graphics, music, video and rich media apps for Android smartphones and tablets Build touchscreen input features into Android apps that allow users to draw, paint, and do other creative forms of input Turn the Android smartphone into a full fledged media player Integrate and use location-based services and media-related web service APIs Who this book is for

This book is aimed primarily at the growing market of Android developers. It is written in such a way that it may be used by those who are familiar with Android, but have no experience developing applications that deal with images, audio, or video Table of Contents Introduction to Android Imaging Building Custom Camera Applications Image Editing and Processing Graphics and Touch Events Introduction to Audio on Android Background and Networked Audio Audio Capture Audio Synthesis and Analysis Introduction to Video Advanced Video Video Capture Media Consumption and Publishing Using Web Services

Network Synthesis Problems (Paperback, Softcover reprint of hardcover 1st ed. 2001): C. Wynants Network Synthesis Problems (Paperback, Softcover reprint of hardcover 1st ed. 2001)
C. Wynants
R2,769 Discovery Miles 27 690 Ships in 10 - 15 working days

As the telecommunication industry introduces new sophisticated technologies, the nature of services and the volume of demands have changed. Indeed, a broad range of new services for users appear, combining voice, data, graphics, video, etc. This implies new planning issues. Fiber transmission systems that can carry large amounts of data on a few strands of wire were introduced. These systems have such a large bandwidth that the failure of even a single transmission link: in the network can create a severe service loss to customers. Therefore, a very high level of service reliability is becoming imperative for both system users and service providers. Since equipment failures and accidents cannot be avoided entirely, networks have to be designed so as to "survive" failures. This is done by judiciously installing spare capacity over the network so that all traffic interrupted by a failure may be diverted around that failure by way of this spare or reserve capacity. This of course translates into huge investments for network operators. Designing such survivable networks while minimizing spare capacity costs is, not surprisingly, a major concern of operating companies which gives rise to very difficult combinatorial problems. In order to make telecommunication networks survivable, one can essentially use two different strategies: protection or restoration. The protection approach preas signs spare capacity to protect each element of the network independently, while the restoration approach spreads the redundant capacity over the whole network and uses it as required in order to restore the disrupted traffic."

Soft Real-Time Systems: Predictability vs. Efficiency - Predictability vs. Efficiency (Paperback, Softcover reprint of... Soft Real-Time Systems: Predictability vs. Efficiency - Predictability vs. Efficiency (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Giorgio C Buttazzo, Giuseppe Lipari, Luca Abeni, Marco Caccamo
R2,782 Discovery Miles 27 820 Ships in 10 - 15 working days

Hard real-time systems are very predictable, but not sufficiently flexible to adapt to dynamic situations. They are built under pessimistic assumptions to cope with worst-case scenarios, so they often waste resources. Soft real-time systems are built to reduce resource consumption, tolerate overloads and adapt to system changes. They are also more suited to novel applications of real-time technology, such as multimedia systems, monitoring apparatuses, telecommunication networks, mobile robotics, virtual reality, and interactive computer games. This unique monograph provides concrete methods for building flexible, predictable soft real-time systems, in order to optimize resources and reduce costs. It is an invaluable reference for developers, as well as researchers and students in Computer Science.

Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems (Paperback, Softcover reprint of hardcover 1st... Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Bharadwaj Veeravalli, Gerassimos Barlas
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in rendering high-quality, high-fidelity, and cost-effective services for network service providers.

Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems presents an up-to-date research status in the domain of distributed video retrieval. This professional book will include several different techniques that are in place for long duration video retrieval. An experimentally tested technology under the JINI platform, demonstrates a practical working system which serves as a feasibility study, as well as the first step in realizing such a technology.

Automated Theorem Proving in Software Engineering (Paperback, Softcover reprint of hardcover 1st ed. 2001): D. Loveland Automated Theorem Proving in Software Engineering (Paperback, Softcover reprint of hardcover 1st ed. 2001)
D. Loveland; Johann M. Schumann
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Growing demands for the quality, safety, and security of software can only be satisfied by the rigorous application of formal methods during software design. This book methodically investigates the potential of first-order logic automated theorem provers for applications in software engineering. Illustrated by complete case studies on protocol verification, verification of security protocols, and logic-based software reuse, this book provides techniques for assessing the prover's capabilities and for selecting and developing an appropriate interface architecture.

From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005): Achim Rettberg,... From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Achim Rettberg, Mauro C. Zanella, Franz J. Rammig
R2,800 Discovery Miles 28 000 Ships in 10 - 15 working days

As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase.

Synergy effects resulting from distributed application functionalities via several electronic control devies, exchanging information through the network brings about more complex system architectures with many different sub-networks, operating with different velocities and different protocol implementations.

To manage the increasing complexity of these systems, a deterministic behaviour of the control units and the communication network must be provided for, in particular when dealing with a distributed functionality.

From Specification to Embedded Systems Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), which was held in August 2005 in Manaus (Brazil) and sponsored by the International Federation for Information Processing (IFIP).

The topics which have been chosen for this working conference are very timely: design methodology, modeling, specification, software synthesis, power management, formal verification, testing, network, communication systems, distributed control systems, resource management and special aspects in system design.

Lean Business Systems and Beyond - First IFIP TC 5 Advanced Production Management Systems Conference (APMS'2006), Wroclaw,... Lean Business Systems and Beyond - First IFIP TC 5 Advanced Production Management Systems Conference (APMS'2006), Wroclaw, Poland, September 18-20, 2006 (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Tomasz Koch
R4,293 Discovery Miles 42 930 Ships in 10 - 15 working days

Lean Manufacturing has proved to be one of the most successful and most powerful production business systems over the last decades. Its application enabled many companies to make a big leap towards better utilization of resources and thus provide better service to the customers through faster response, higher quality and lowered costs. Lean is often described as "eyes for flow and eyes for muda" philosophy. It simply means that value is created only when all the resources flow through the system. If the flow is stopped no value but only costs and time are added, which is muda (Jap. waste). Since the philosophy was born at the Toyota many solutions were tailored for the high volume environment. But in turbulent, fast-changing market environment and progressing globalization, customers tend to require more customization, lower volumes and higher variety at much less cost and of better quality. This calls for adaptation of existing lean techniques and exploration of the new waste-free solutions that go far beyond manufacturing. This book brings together the opinions of a number of leading academics and researchers from around the world responding to those emerging needs. They tried to find answer to the question how to move forward from "Spaghetti World" of supply, production, distribution, sales, administration, product development, logistics, accounting, etc. Through individual chapters in this book authors present their views, approaches, concepts and developed tools. The reader will learn the key issues currently being addressed in production management research and practice throughout the world.

Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003): Axel Jantsch, Hannu Tenhunen Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Axel Jantsch, Hannu Tenhunen
R4,237 Discovery Miles 42 370 Ships in 10 - 15 working days

Networks on Chip presents a variety of topics, problems and approaches with the common theme to systematically organize the on-chip communication in the form of a regular, shared communication network on chip, an NoC for short.

As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary. Different variants of packed switched on-chip networks have been proposed by several groups during the past two years. This book summarizes the state of the art of these efforts and discusses the major issues from the physical integration to architecture to operating systems and application interfaces. It also provides a guideline and vision about the direction this field is moving to. Moreover, the book outlines the consequences of adopting design platforms based on packet switched network. The consequences may in fact be far reaching because many of the topics of distributed systems, distributed real-time systems, fault tolerant systems, parallel computer architecture, parallel programming as well as traditional system-on-chip issues will appear relevant but within the constraints of a single chip VLSI implementation.

The book is organized in three parts. The first deals with system design and methodology issues. The second presents problems and solutions concerning the hardware and the basic communication infrastructure. Finally, the third part covers operating system, embedded software and application. However, communication from the physical to the application level is a central theme throughout the book.

The book serves as an excellent reference source and may be used as a text for advanced courses on the subject.

Beginning iPhone and iPad Web Apps - Scripting with HTML5, CSS3, and JavaScript (Paperback, 1st ed.): Chris Apers, Daniel... Beginning iPhone and iPad Web Apps - Scripting with HTML5, CSS3, and JavaScript (Paperback, 1st ed.)
Chris Apers, Daniel Paterson
R1,062 R888 Discovery Miles 8 880 Save R174 (16%) Ships in 10 - 15 working days

It seems that everyone and her sister has developed an iPhone App-everyone except you, the hard-working web professional. And now with the introduction of the iPad, you may even feel farther behind. But the time has come where you don't need to struggle through Objective-C or master Apple's Cocoa touch APIs. WebKit's support for HTML5 means any ambitious web developer can join Apple's second mobile App wave and create compelling apps that address the unique features of both the iPhone and the larger iPad. Beginning iPhone and iPad Web Apps: Scripting with HTML5, CSS3, and JavaScript takes you through every aspect of the latest Mobile Web Standards as well as the specific features of the iPhone and iPad. You'll go beyond Web 2.0 and Ajax to learn about WebKit and Mobile Safari, HTML5 and CSS3, Vector Graphics and Multimedia support. You'll discover what built-in hardware features of the iPhone and iPad you can use and how to take advantage of these device-specific capabilities. The market for Web apps is expanding and the combination of iPhone and iPad makes this a very hot area-as well as a competitive one.You'll want to know about all the advantages available to get ahead and stay ahead, and Beginning iPhone and iPad Web Apps is the perfect starting point.

New Horizons of Parallel and Distributed Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005): Minyi Guo,... New Horizons of Parallel and Distributed Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Minyi Guo, Laurence Tianruo Yang
R4,244 Discovery Miles 42 440 Ships in 10 - 15 working days

Parallel and distributed computing is one of the foremost technologies for shaping
future research and development activities in academia and industry. Hyperthreading in Intel processors, hypertransport links in next generation AMD processors, multicore silicon in today's high-end microprocessors, and emerging cluster and grid computing have moved parallel/distributed computing into the mainstream of computing.

New Horizons of Parallel and Distributed Computing is a collection of self-contained chapters written by pioneering researchers to provide solutions for newly emerging problems in this field. This volume will not only provide novel ideas, work in progress and state-of-the-art techniques in the field, but will also stimulate future research activities in the area of parallel and distributed computing with applications.

New Horizons of Parallel and Distributed Computing is intended for industry researchers and developers, as well as for academic researchers and advanced-level students in computer science and electrical engineering. A valuable reference work, it is also suitable as a textbook.

Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007):... Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R3,028 Discovery Miles 30 280 Ships in 10 - 15 working days

Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. This book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.

Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002): Robert Graybill, Rami Melhem Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Robert Graybill, Rami Melhem
R5,489 Discovery Miles 54 890 Ships in 10 - 15 working days

With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. One current research initiative, which drew much attention to this area, is the Power Aware Computing and Communications (PAC/C) program sponsored by DARPA. Many of the chapters in this book include results from work that have been supported by the PACIC program. The performance of computer systems has been tremendously improving while the size and weight of such systems has been constantly shrinking. The capacities of batteries relative to their sizes and weights has been also improv ing but at a rate which is much slower than the rate of improvement in computer performance and the rate of shrinking in computer sizes. The relation between the power consumption of a computer system and it performance and size is a complex one which is very much dependent on the specific system and the technology used to build that system. We do not need a complex argument, however, to be convinced that energy and power, which is the rate of energy consumption, are becoming critical components in computer systems in gen eral, and portable and autonomous systems, in particular. Most of the early research on power consumption in computer systems ad dressed the issue of minimizing power in a given platform, which usually translates into minimizing energy consumption, and thus, longer battery life."

SIMD Programming Manual for Linux and Windows (Paperback, Softcover reprint of hardcover 1st ed. 2004): Paul Cockshott, Kenneth... SIMD Programming Manual for Linux and Windows (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Paul Cockshott, Kenneth Renfrew
R4,017 Discovery Miles 40 170 Ships in 10 - 15 working days

A number of widely used contemporary processors have instruction-set extensions for improved performance in multi-media applications. The aim is to allow operations to proceed on multiple pixels each clock cycle. Such instruction-sets have been incorporated both in specialist DSPchips such as the Texas C62xx (Texas Instruments, 1998) and in general purpose CPU chips like the Intel IA32 (Intel, 2000) or the AMD K6 (Advanced Micro Devices, 1999). These instruction-set extensions are typically based on the Single Instruc tion-stream Multiple Data-stream (SIMD) model in which a single instruction causes the same mathematical operation to be carried out on several operands, or pairs of operands, at the same time. The level or parallelism supported ranges from two floating point operations, at a time on the AMD K6 architecture to 16 byte operations at a time on the Intel P4 architecture. Whereas processor architectures are moving towards greater levels of parallelism, the most widely used programming languages such as C, Java and Delphi are structured around a model of computation in which operations takeplace on a single value at a time. This was appropriate when processors worked this way, but has become an impediment to programmers seeking to make use of the performance offered by multi-media instruction -sets. The introduction of SIMD instruction sets (Peleg et al."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R450 R248 Discovery Miles 2 480
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,252 Discovery Miles 12 520
Linux - The Ultimate Crash Course to…
Mark Reed Hardcover R605 R505 Discovery Miles 5 050
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760
Excel Basics In 30 Minutes - The…
Ian Lamont Hardcover R520 Discovery Miles 5 200
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,482 Discovery Miles 14 820
Powershell - The ultimate beginner's…
Craig Newport Hardcover R593 R491 Discovery Miles 4 910
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
Coding Basics for Beginners - The Smart…
Jefferson Sandyman Hardcover R557 Discovery Miles 5 570
PowerShell - The Ultimate Beginners…
Mark Reed Hardcover R615 R516 Discovery Miles 5 160

 

Partners