![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming > Software engineering
In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. The book elucidates the concepts, architectures, well-defined building blocks, and prototypes for mobile microservice platforms and pervasive application development, as well as the implementation and configuration of service middleware and AI-based microservices. A goal-oriented service composition model is then proposed by the author, allowing for an economic assessment of connected, smart mobile services. Based on this model, costs can be minimized through statistical workload aggregation effects or backhaul data transport reduction, and customer experience and safety can be enhanced through reduced response times. This title will be a useful guide for students and IT professionals to get started with microservices and when studying the use of microservices in pervasive applications. It will also appeal to researchers and students studying software architecture and service-oriented computing, and especially those interested in edge computing, pervasive computing, the Internet of Things, and mobile microservices.
Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts - faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.
Written by a game developer and professor trained in architecture, An Architectural Approach to Level Design is one of the first books to integrate architectural and spatial design theory with the field of level design. It explores the principles of level design through the context and history of architecture. Now in its second edition, An Architectural Approach to Level Design presents architectural techniques and theories for you to use in your own work. The author connects architecture and level design in different ways that address the practical elements of how designers construct space and the experiential elements of how and why humans interact with that space. It also addresses industry issues like how to build interesting tutorial levels and how to use computer-generated level design systems without losing the player-focused design of handmade levels. Throughout the text, you will learn skills for spatial layout, evoking emotion through gamespaces, and creating better levels through architectural theory. FEATURES Presents case studies that offer insight on modern level design practices, methods, and tools Presents perspectives from industry designers, independent game developers, scientists, psychologists, and academics Explores how historical structures can teach us about good level design Shows how to use space to guide or elicit emotion from players Includes chapter exercises that encourage you to use principles from the chapter in digital prototypes, playtesting sessions, paper mock-ups, and design journals Bringing together topics in game design and architecture, this book helps you create better spaces for your games. Software independent, the book discusses tools and techniques that you can use in crafting your interactive worlds.
This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems. The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain. This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.
The book emphasizes the predictive models of Big Data, Genetic Algorithm, and IoT with a case study. The book illustrates the predictive models with integrated fuel consumption models for smart and safe traveling. The text is a coordinated amalgamation of research contributions and industrial applications in the field of Intelligent Transportation Systems. The advanced predictive models and research results were achieved with the case studies, deployed in real transportation environments. Features: Provides a smart traffic congestion avoidance system with an integrated fuel consumption model. Predicts traffic in short-term and regular. This is illustrated with a case study. Efficient Traffic light controller and deviation system in accordance with the traffic scenario. IoT based Intelligent Transport Systems in a Global perspective. Intelligent Traffic Light Control System and Ambulance Control System. Provides a predictive framework that can handle the traffic on abnormal days, such as weekends, festival holidays. Bunch of solutions and ideas for smart traffic development in smart cities. This book focuses on advanced predictive models along with offering an efficient solution for smart traffic management system. This book will give a brief idea of the available algorithms/techniques of big data, IoT, and genetic algorithm and guides in developing a solution for smart city applications. This book will be a complete framework for ITS domain with the advanced concepts of Big Data Analytics, Genetic Algorithm and IoT. This book is primarily aimed at IT professionals. Undergraduates, graduates and researchers in the area of computer science and information technology will also find this book useful.
Combining theory and practice, this updated new edition provides a complete overview of how to create deep and meaningful quests for games. It uses the Unity game engine in conjunction with Fungus and other free plugins to provide an accessible entry into quest design. The book begins with an introduction to the theory and history of quests in games, before covering four theoretical components of quests: their spaces, objects, actors, and challenges. Each chapter also includes a practical section, with accompanying exercises and suggestions for the use of specific technologies for four crucial aspects of quest design: * level design * quest item creation * NPC and dialogue construction * scripting This book will be of great interest to all game designers looking to create new, innovative quests in their games. It will also appeal to new media researchers, as well as humanities scholars in the fields of mythology and depth-psychology that want to bring computer-assisted instruction into their classroom in an innovative way. The companion website includes lecture and workshop slides, and can be accessed at: www.designingquests.com
Software Quality Assurance in Large Scale and Complex Software-intensive Systems presents novel and high-quality research related approaches that relate the quality of software architecture to system requirements, system architecture and enterprise-architecture, or software testing. Modern software has become complex and adaptable due to the emergence of globalization and new software technologies, devices and networks. These changes challenge both traditional software quality assurance techniques and software engineers to ensure software quality when building today (and tomorrow's) adaptive, context-sensitive, and highly diverse applications. This edited volume presents state of the art techniques, methodologies, tools, best practices and guidelines for software quality assurance and offers guidance for future software engineering research and practice. Each contributed chapter considers the practical application of the topic through case studies, experiments, empirical validation, or systematic comparisons with other approaches already in practice. Topics of interest include, but are not limited, to: quality attributes of system/software architectures; aligning enterprise, system, and software architecture from the point of view of total quality; design decisions and their influence on the quality of system/software architecture; methods and processes for evaluating architecture quality; quality assessment of legacy systems and third party applications; lessons learned and empirical validation of theories and frameworks on architectural quality; empirical validation and testing for assessing architecture quality.
This volume provides an overview and an understanding of REST (Representational State Transfer). Discussing the constraints of REST the book focuses on REST as a type of web architectural style. The focus is on applying REST beyond Web applications (i.e., in enterprise environments), and in reusing established and well-understood design patterns when doing so. The reader will be able to understand how RESTful systems can be designed and deployed, and what the results are in terms of benefits and challenges encountered in the process. Since REST is relatively new as an approach for designing Web Services, the more advanced part of the book collects a number of challenges to some of the assumptions and constraints of REST, and looks at current research work on how REST can be extended and applied to scenarios that often are considered not to be a good match for REST. This work will help readers to reach a deeper understanding of REST on a practical as well as on an advanced level.
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations
Learning by Doing with National Instruments Development Boards starts with a brief introduction to LabVIEW programming, which is required to explore the National Instrument platform, an introduction that includes detailed installation and licensing setup. Further, it gives the features and configuration setup of NI SPEEDY-33, NI ELVIS and myRIO boards. The focus of the book is on worked-out case studies for students working in different areas of electronics such as basic digital design, biomedical instrumentation, sensors and measurement. Data acquisition using SPEEDY-33, NI -ELVIS and myRIO kits is also odiscussed. The book also examines the myRIO platform.
Do you have creative ideas that you wish you could transform into code? Do you want to boost your problem solving and logic skills? Do you want to enhance your career by adopting an algorithmic mindset? In our increasingly digital world, coding is an essential skill. Communicating an algorithm to a machine to perform a set of tasks is vital. Beginner's Guide to Code Algorithms: Experiments to Enhance Productivity and Solve Problems written by Deepankar Maitra teaches you how to think like a programmer. The author unravels the secret behind writing code - building a good algorithm. Algorithmic thinking leads to asking the right question and enables a shift from issue resolution to value creation. Having this mindset will make you more marketable to employers. This book takes you on a problem-solving journey to expand your mind and increase your willingness to experiment with code. You will: Learn the art of building an algorithm through hands-on exercises Understand how to develop code for inspiring productivity concepts Build a mentality of developing algorithms to solve problems Develop, test, review, and improve code through guided experimentation This book is designed to develop a culture of logical thinking through intellectual stimulation. It will benefit students and teachers of programming, business professionals, as well as experienced users of Microsoft Excel who wish to become proficient with macros.
We're at an inflection point in data, where our data management solutions no longer match the complexity of organizations, the proliferation of data sources, and the scope of our aspirations to get value from data with AI and analytics. In this practical book, author Zhamak Dehghani introduces data mesh, a decentralized sociotechnical paradigm drawn from modern distributed architecture that provides a new approach to sourcing, sharing, accessing, and managing analytical data at scale. Dehghani guides practitioners, architects, technical leaders, and decision makers on their journey from traditional big data architecture to a distributed and multidimensional approach to analytical data management. Data mesh treats data as a product, considers domains as a primary concern, applies platform thinking to create self-serve data infrastructure, and introduces a federated computational model of data governance. Get a complete introduction to data mesh principles and its constituents Design a data mesh architecture Guide a data mesh strategy and execution Navigate organizational design to a decentralized data ownership model Move beyond traditional data warehouses and lakes to a distributed data mesh
The concept of processes is at the heart of software and systems engineering. Software process models integrate software engineering methods and techniques and are the basis for managing large-scale software and IT projects. High product quality routinely results from high process quality. Software process management deals with getting and maintaining control over processes and their evolution. Becoming acquainted with existing software process models is not enough, though. It is important to understand how to select, define, manage, deploy, evaluate, and systematically evolve software process models so that they suitably address the problems, applications, and environments to which they are applied. Providing basic knowledge for these important tasks is the main goal of this textbook. Munch and his co-authors aim at providing knowledge that enables readers to develop useful process models that are suitable for their own purposes. They start with the basic concepts. Subsequently, existing representative process models are introduced, followed by a description of how to create individual models and the necessary means for doing so (i.e., notations and tools). Lastly, different possible usage scenarios for process management are highlighted (e.g. process improvement and software process simulation). Their book is aimed at students and researchers working on software project management, software quality assurance, and software measurement; and at practitioners who are interested in process definition and management for developing, maintaining, and operating software-intensive systems and services."
Is Internet software so different from "ordinary" software? This book practically answers this question through the presentation of a software design method based on the State Chart XML W3C standard along with Java. Web enterprise, Internet-of-Things, and Android applications, in particular, are seamlessly specified and implemented from "executable models." Internet software puts forward the idea of event-driven or reactive programming, as pointed out in Boner et al.'s "Reactive Manifesto" (http://www.reactivemanifesto.org). It tells us that reactiveness is a must. However, beyond concepts, software engineers require effective means with which to put reactive programming into practice. This book's purpose is to outline and explain such means. The lack of professional examples in the literature that illustrate how reactive software should be shaped can be quite frustrating. Therefore, this book helps to fill in that gap by providing in-depth professional case studies that contain comprehensive details and meaningful alternatives. Furthermore, these case studies can be downloaded for further investigation. Internet software requires higher adaptation, at run time in particular. After reading Reactive Internet Programming, the reader therefore will be ready to enter the forthcoming Internet era.
Power and Performance: Software Analysis and Optimization is a guide to solving performance problems in modern Linux systems. Power-efficient chips are no help if the software those chips run on is inefficient. Starting with the necessary architectural background as a foundation, the book demonstrates the proper usage of performance analysis tools in order to pinpoint the cause of performance problems, and includes best practices for handling common performance issues those tools identify.
The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.
Management of the Object-Oriented Development Process consists of a series of high-level discussions on technical and managerial issues related to object-oriented development. This book introduces object-oriented development techniques, including modeling languages, programming languages, reusable patterns and software development processes. It discusses the ongoing trends of object-oriented development, including emerging e-business development frameworks, executable UML and requirements engineering. There is also a focus on managerial issues such as project management and software evaluation, and how to manage the paradigm shift from structured to object-oriented development. Management of the Object-Oriented Development Process offers systems developers, project managers, information systems students and researchers technical skills as well as strategic insights on how to manage software projects, deploy object-oriented software development processes, understand the current trends and make the transition from structured to object-oriented techniques.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.
The purpose of the 9th International Conference on Software Engineering Research, Management and Applications(SERA 2011) held on August 10-12, 2011 in Baltimore, Maryland was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas and research results about all aspects (theory, applications and tools) of computer and information sciences, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected 12 outstanding papers from SERA 2011, all of which you will find in this volume of Springer's Studies in Computational Intelligence. "
System Level Design of Reconfigurable Systems-on-Chip provides insight in the challenges and difficulties encountered during the design of reconfigurable Systems-on-Chip (SoCs). Reconfiguration is becoming an important part of System-on-Chip design to cope with the increasing demands for simultaneous flexibility and computational power. The book focuses on system level design issues for reconfigurable SoCs, and provides information on reconfiguration aspects of complex SoCs and how they can be implemented in practice. It is divided in three parts. The first part provides background information and requirements on reconfigurable technologies and systems. The second one identifies existing methodological gaps, and introduces a design flow for developing reconfigurable Systems-on-Chip. The high level part of the design flow can be covered by two C++ based methodologies: one based on SystemC and one based on OCAPI-XL, both including appropriate extensions to handle reconfiguration issues. Finally, the third part of the book presents reconfigurable SoCs from the perspective of the designer, through three indicative case studies from the wireless and multimedia communication domain.
The field of information technology continues to advance at a brisk pace, including the use of Remote Laboratory (RL) systems in education and research. To address the needs of remote laboratory development for such purposes, the authors present a new state-of-the-art unified framework for RL system development. Included are solutions to commonly encountered RL implementation issues such as third-party plugin, traversing firewalls, cross platform running, and scalability, etc. Additionally, the book introduces a new application architecture of remote lab for mobile-optimized RL application development for Mobile Learning (M-Learning). It also shows how to design and organize the remote experiments at different universities and make available a framework source code. The book is intended to serve as a complete guide for remote lab system design and implementation for an audience comprised of researchers, practitioners and students to enable them to rapidly and flexibly implement RL systems for a range of fields.
provides a thorough understanding of the integration of computational intelligence with information retrieval includes discussion on protecting and analysing big data on cloud platforms provides a plethora of theoretical as well as experimental research, along with surveys and impact studies
1) The book provides a basic understanding to readers who want to start their career in web application development. The book develops an understanding of the basics concepts and then takes a broader turn to enlighten the readers about the horizons which can be accessed using JavaScript. 2) JavaScript is exhaustively used in almost all kinds of application development, be it the web applications, cross platform mobile applications, server backend applications. JavaScript is now being used for full stack development and is thus used to write independent applications. Since the need for JavaScript web developers is high, the numbers of students should be high as well. 3) As compared to other books in the market, the proposed book would cover more topics (or, better, levels) in a single volume. |
![]() ![]() You may like...
AI and Analytics for Smart Cities and…
Robin Qiu, Kelly Lyons, …
Hardcover
R5,643
Discovery Miles 56 430
Fitting Smooth Functions to Data
Charles Fefferman, Arie Israel
Paperback
R1,639
Discovery Miles 16 390
Virtual Traumascapes and Exploring the…
Maximiliano Korstanje, Babu George
Hardcover
R5,294
Discovery Miles 52 940
Differential Equations with…
Warren Wright, Dennis Zill
Paperback
![]()
|