![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Systems analysis & design
It is our great pleasure to present the proceedings of the 16th International ConferenceonAnalyticalandStochasticModellingTechniquesandApplications (ASMTA 2009) that took place in Madrid. The conference has become an established annual event in the agenda of the experts of analytical modelling and performance evaluation in Europe and internationally. This year the proceedings continued to be published as part of Springer's prestigiousLecture Notes in Computer Science (LNCS) series. This is another sign of the growing con?dence in the quality standards and procedures followed in the reviewing process and the program compilation. Following the traditions of the conference, ASMTA 2009, was honored to have a distinguished keynote speaker in the person of Kishor Trivedi. Professor Trivedi holds the Hudson Chair in the Department of Electrical and Computer EngineeringatDukeUniversity, Durham, NC, USA. HeistheDuke-SiteDirector of an NSF Industry-University Cooperative Research Center between NC State University and Duke University for carrying out applied research in computing and communications. He has been on the Duke faculty since 1975. He is the author of a well-known text entitled Probability and Statistics with Reliability, Queuing and Computer Science Applications, published by Prentice-Hall, the secondeditionofwhichhasjustappeared. Hehasalsopublishedtwootherbooks entitled Performance and Reliability Analysis of Computer Systems, published by Kluwer Academic Publishers, and Queueing Networks and Markov Chains, by John Wiley. He is also known for his work on the modelling and analysis of software aging and rejuvenation. The conference maintained the tradition of high-quality programs with an acceptance rate of about 40%.
OpenMP is an application programming interface (API) that is widely accepted as a de facto standard for high-level shared-memory parallel programming. It is a portable, scalable programming model that provides a simple and ?exible interface for developing shared-memory parallel applications in Fortran, C, and C++. Since its introduction in 1997, OpenMP has gained support from the - jority of high-performance compiler and hardware vendors. Under the direction of the OpenMP Architecture Review Board (ARB), the OpenMP speci?cation is undergoing further improvement. Active research in OpenMP compilers, r- time systems, tools, and environments continues to drive OpenMP evolution.To provideaforumforthedisseminationandexchangeofinformationaboutand- periences with OpenMP, the community of OpenMP researchersand developers in academia and industry is organized under cOMPunity (www.compunity.org). This organization has held workshops on OpenMP since 1999. This book contains the proceedings of the 5th International Workshop on OpenMP held in Dresden in June 2009. With sessions on tools, benchmarks, applications, performance and runtime environments it covered all aspects of the current use of OpenMP. In addition, several contributions presented p- posed extensions to OpenMP and evaluated reference implementations of those extensions. An invited talk provided the details on the latest speci?cation dev- opment inside the Architecture Review Board. Together with the two keynotes about OpenMP on hardware accelerators and future generation processors it demonstrated that OpenMP is suitable for future generation systems.
The First International Workshop on Traffic Monitoring and Analysis (TMA 2009) was an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (www.cost-tma.eu). The COST program is an intergovernmental framework for European Cooperation in Science and Technology, allowing the coordination of nationally funded research on a European level. Each COST Action contributes to reducing the fragmentation in research and opening the European Research Area to cooperation worldwide. Traffic monitoring and analysis (TMA) is now an important research topic within the field of networking. It involves many research groups worldwide that are coll- tively advancing our understanding of the Internet. The importance of TMA research is motivated by the fact that modern packet n- works are highly complex and ever-evolving objects. Understanding, developing and managing such environments is difficult and expensive in practice. Traffic monitoring is a key methodology for understanding telecommunication technology and improving its operation, and the recent advances in this field suggest that evolved TMA-based techniques can play a key role in the operation of real networks. Moreover, TMA offers a basis for prevention and response in network security, as typically the det- tion of attacks and intrusions requires the analysis of detailed traffic records. On the more theoretical side, TMA is an attractive research topic for many reasons.
in the algorithmic and foundational aspects, high-level approaches as well as more applied and technology-related issues regarding tools and applications of wireless sensor networks. June 2009 Jie Wu Viktor K. Prasanna Ivan Stojmenovic Message from the Program Chair This proceedings volume includes the accepted papers of the 5th International Conference on Distributed Computing in Sensor Systems. This year we int- duced some changes in the composition of the three tracks to increase cro- disciplinary interactions. The Algorithms track was enhanced to include topics pertaining to performance analysis and network optimization and renamed "- gorithms and Analysis. " The Systems and Applications tracks, previously s- arate, were combined into a single track. And a new track was introduced on "Signal Processing and Information Theory. " DCOSS 2009 received 116 submissions for the three tracks. After a thorough reviewprocess, inwhichatleastthreereviewsweresolicitedforallpapers, atotal of 26 papers were accepted. The research contributions in this proceedings span many aspects of sensor systems, including energy-e?cient mechanisms, tracking and surveillance, activity recognition, simulation, query optimization, network coding, localization, application development, data and code dissemination. Basedonthereviews, wealsoidenti?edthebestpaperfromeachtrack, which are as follows: BestpaperintheAlgorithmsandAnalysistrack: "E?cientSensorPlacement for Surveillance Problems" by Pankaj Agarwal, Esther Ezra and Shashidhara Ganjugunte. Best paper in the Applications and Systems track: "Optimal Allocation of Time-Resources for Multihypothesis Activity-Level Detection," by Gautam Thatte, ViktorRozgic, MingLi, SabyasachiGhosh, UrbashiMitra, ShriNarayanan, Murali Annavaram and Donna Spruijt-Metz. Best paper in the Signal Processing and Information Theory track: "D- tributed Computation of Likelihood Maps for Target Tracking" by Jonathan Gallagher, Randolph Moses and Emre Ertin.
A family of internationally popular microcontrollers, the Atmel AVR microcontroller series is a low-cost hardware development platform suitable for an educational environment. Until now, no text focused on the assembly language programming of these microcontrollers. Through detailed coverage of assembly language programming principles and techniques, Some Assembly Required: Assembly Language Programming with the AVR Microcontroller teaches the basic system capabilities of 8-bit AVR microcontrollers. The text illustrates fundamental computer architecture and programming structures using AVR assembly language. It employs the core AVR 8-bit RISC microcontroller architecture and a limited collection of external devices, such as push buttons, LEDs, and serial communications, to describe control structures, memory use and allocation, stacks, and I/O. Each chapter contains numerous examples and exercises, including programming problems. By studying assembly languages, computer scientists gain an understanding of the functionality of basic processors and how their capabilities support high level languages and applications. Exploring this connection between hardware and software, this book provides a foundation for understanding compilers, linkers, loaders, and operating systems in addition to the processors themselves.
Knowledge science is an emerging discipline resulting from the demands of a knowledge-based economy and information revolution. Explaining how to improve our knowledge-based society, Knowledge Science: Modeling the Knowledge Creation Process addresses problems in collecting, synthesizing, coordinating, and creating knowledge. The book introduces several key concepts in knowledge science: Knowledge technology, which encompasses classification, representation, modeling, identification, acquisition, searching, organization, storage, conversion, and dissemination Knowledge management, which covers three different yet related areas (knowledge assets, knowing processes, knower relations) Knowledge discovery and data mining, which combine databases, statistics, machine learning, and related areas to discover and extract valuable knowledge from large volumes of data Knowledge synthesis, knowledge justification, and knowledge construction, which are important in solving real-life problems Specialists in decision science, artificial intelligence, systems engineering, behavioral science, and management science, the book's contributors present their own original ideas, including an Oriental systems philosophy, a new episteme in the knowledge-based society, and a theory of knowledge construction. They emphasize the importance of systemic thinking for developing a better society in the current knowledge-based era.
Parameterized complexity theory is a recent branch of computational complexity theory that provides a framework for a refined analysis of hard algorithmic problems. The central notion of the theory, fixed-parameter tractability, has led to the development of various new algorithmic techniques and a whole new theory of intractability. This book is a state-of-the-art introduction to both algorithmic techniques for fixed-parameter tractability and the structural theory of parameterized complexity classes, and it presents detailed proofs of recent advanced results that have not appeared in book form before. Several chapters are each devoted to intractability, algorithmic techniques for designing fixed-parameter tractable algorithms, and bounded fixed-parameter tractability and subexponential time complexity. The treatment is comprehensive, and the reader is supported with exercises, notes, a detailed index, and some background on complexity theory and logic. The book will be of interest to computer scientists, mathematicians and graduate students engaged with algorithms and problem complexity.
Euro-Par is an annual series of international conferences dedicated to the p- motion and advancement of all aspects of parallel and distributed computing. th Euro-Par 2009 was the 15 edition in this conference series. Througout the years, the Euro-Par conferences have always attracted high-quality submissions and have become one of the established conferences in the area of parallel and distributed processing. Built upon the success of the annual conferences and in order to accommodate the needs of special interest groups (among the conf- ence participants), starting from 2006, a series of workshopsin conjunction with the Euro-Par main conference have been organized. This was the ?fth year in which workshops were organized within the Euro-Par conference format. The workshops focus on advanced specialized topics in parallel and d- tributed computing. These topics re?ect new scienti?c and technological dev- opments. While the community for such new and speci?c developments is still small and the topics have yet to become mature, the Euro-Par conference o?ers a platform in the form of a workshop to exchange ideas and discuss cooperation opportunities. The workshops in the past four years have been very successful. The number ofworkshopproposalsandthenumberof?nallyacceptedworkshopshavegra- ally increasedsince 2006.In 2008, nine workshopswereorganizedin conjunction with the main Euro-Par conference. In 2009, there were again nine workshop
These proceedings are compiled from revised submissions presented at RV 2008, the 8th InternationalWorkshopon Runtime Veri?cationheld onMarch30, 2008 in Budapest, Hungary, as a satellite event of ETAPS 2008. There were 27 submissions. Each submission was reviewed by at least three ProgramCommitteemembers.Thecommitteedecidedtoacceptninepapers.This volume also includes two contributions by the invited speakers Jean Goubault- Larrecq(LSV/ENSCachan)on"ASmellofOrchids"andJohnRushby(SRI)on "RuntimeCerti?cation." We would like to thank the members of the Program Committee and the additional referees for their timely reviewing and lively participation in the s- sequent discussion-the quality of the contributions herein is due to their e?orts and expertise. We would like to thank the local organizers of ETAPS 2008 for facilitating this workshop. We would also like to thank the Technical University of Munich for their ?nancial support. Last but not least, we thank the parti- pants of RV 2008 for the stimulating discussions during the workshop and the authors for re?ecting this discussion in their revised papers. We acknowlege the e?ort of the EasyChair support team.
The Workshop on Self-sustaining Systems (S3) is a forum for the discussion of topics relating to computer systems and languages that are able to bootstrap, implement, modify, and maintain themselves. One property of these systems is that their implementation is based onsmall but powerfulabstractions;examples include (amongst others) Squeak/Smalltalk, COLA, Klein/Self, PyPy/Python, Rubinius/Ruby, andLisp.Suchsystemsaretheenginesoftheirownreplacement, giving researchers and developers great power to experiment with, and explore future directions from within, their own small language kernels. S3 took place on May 15-16, 2008 at the Hasso-Plattner-Institute (HPI) in Potsdam, Germany. It was an exciting opportunity for researchers and prac- tioners interested in self-sustaining systems to meet and share their knowledge, experience, and ideas for future research and development. S3 provided an - portunity for a community to gather and discuss the need for self-sustainability in software systems, and to share and explore thoughts on why such systems are needed and how they can be created and deployed. Analogies were made, for example, with evolutionary cycles, and with urban design and the subsequent inevitable socially-driven change. TheS3participantsleftwithagreatersenseofcommunityandanenthusiasm for probing more deeply into this subject. We see the need for self-sustaining systems becoming critical not only to the developer's community, but to e- users in business, academia, learning and play, and so we hope that this S3 workshop will become the ?rst of many.
The Second International Conference on High-Performance Computing and Appli- tions (HPCA 2009) was a follow-up event of the successful HPCA 2004. It was held in Shanghai, a beautiful, active, and modern city in China, August 10-12, 2009. It served as a forum to present current work by researchers and software developers from around the world as well as to highlight activities in the high-performance c- puting area. It aimed to bring together research scientists, application pioneers, and software developers to discuss problems and solutions and to identify new issues in this area. This conference emphasized the development and study of novel approaches for high-performance computing, the design and analysis of high-performance - merical algorithms, and their scientific, engineering, and industrial applications. It offered the conference participants a great opportunity to exchange the latest research results, heighten international collaboration, and discuss future research ideas in HPCA. In addition to 24 invited presentations, the conference received over 300 contr- uted submissions from over ten countries and regions worldwide, about 70 of which were accepted for presentation at HPCA 2009. The conference proceedings contain some of the invited presentations and contributed submissions, and cover such research areas of interest as numerical algorithms and solutions, high-performance and grid c- puting, novel approaches to high-performance computing, massive data storage and processing, hardware acceleration, and their wide applications.
th We are delighted to present the proceedings of the 11 Asia-Paci?c Network Operations and Management Symposium (APNOMS 2008) which was held in Beijing, China, during October 22-24, 2008. TheOrganizingCommittee(OC)selectedthethemeofthisyear'ssymposium as "Challenges for Next-Generation Network Operations and Service Mana- ment. " Research and development on next-generation networks (NGNs) have been carried out over the last few years and we are already seeing their - ployment and operations in many parts of Asia-Paci?c countries. We are also beginning to experience new and interesting services that utilize these NGNs. We are certain that we will see more deployment of NGNs and NGN services in the next few years. Thus, the operations and management of NGNs and their services are very important to the network operators and service providers. At the same time, they are also concerned about new and more e?ective ways of performing the operations and management. This year, the APNOMS call for papers received 195 paper submissions from 19di?erentcountries, includingcountriesoutsidetheAsia-Paci?cregion(Europe, Middle-East, North and South America). Each paper was carefully reviewed by at least three international experts. Based on review scores, the APNOMS 2008 Technical ProgramCommittee discussed the selection of papers, and selected 43 high-quality papers (22. 1% of submissions) as full papers and 34 papers as short papers. Accepted papers were arrangedinto ten technical sessions and two short paper sessions (poster presentation).
Recent advances in cutting-edge wireless communication and computing te- nologies have paved the way for the proliferation of ubiquitous infrastructure and infrastructureless wireless networks. These emerging networks are enabling a broad spectrum of applications ranging from critical infrastructure prot- tion and security, to environment monitoring, health care, and quality of life. The need to deal with the complexity and rami?cations of the ever-growing mobile users and services, however, is intensifying the interest in the devel- ment of sound fundamental principles, novel algorithmic approaches, rigorous and repeatable design methodologies, and systematic evaluation frameworks for next-generation wireless networks. The Third International Conference on Wireless Algorithms, Systems and Applications (WASA) was held in Dallas, TX, USA during October 26-28. The objective of WASA is to address the research and development e?orts of va- ous issues in the area of algorithms, systems and applications for current and next-generationinfrastructureandinfrastructurelesswirelessnetworks. Thec- ference is structured to provide a forum for researchers and practitioners, from the academic, industrial, and governmental sectors, with a unique opportunity to discussandexpresstheirviews onthe currenttrends, challenges, andstate-- the-artsolutionsaddressingvariousissuesrelatedtocurrentandnext-generation wireless networks. Following a rigorous review process, the Program Committee selected an outstanding set of 35 papers for publication in the proceedings and oral presentations at the conference. The program of WASA 2008 also included three keynote talks by Lionel Ni, Ty Znati, and Jie Wu along with 15 invited paper
Companies and institutions depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based. Business Continuity is the ability to do business under any circumstances and is an essential requirement faced by modern companies. Both concepts - High Availability and Disaster Recovery - are realized by redundant systems. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux Systems.
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security--ESORICS 2008--held October 6-8, 2008 in Torremolinos (Malaga), Spain, and hosted by the University of Malaga, C- puter Science Department. ESORICS has become the European research event in computer security. The symposium started in 1990 and has been organized on alternate years in different European countries. From 2002 it has taken place yearly. It attracts an international audience from both the academic and industrial communities. In response to the call for papers, 168 papers were submitted to the symposium. These papers were evaluated on the basis of their significance, novelty, and technical quality. Each paper was reviewed by at least three members of the Program Comm- tee. The Program Committee meeting was held electronically, holding intensive d- cussion over a period of two weeks. Finally, 37 papers were selected for presentation at the symposium, giving an acceptance rate of 22%.
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and u- and e-Service, Science and Technology (UNESST).
This volume presents the proceedings of the 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and of the Third International ICST Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications. Both events were held in Las Palmas de Gran Canaria in November 2009. To each of these events is devoted a specific part of the volume. The first part is dedicated to the proceedings of ICST QShine 2009. The first four chapters deal with new issues concerning the quality of service in IP-based telephony and multimedia. A second set of four chapters addresses some important research problems in mul- hop wireless networks, with a special emphasis on the problems of routing. The following three papers deal with recent advances in the field of data mana- ment and area coverage in sensor networks, while a fourth set of chapters deals with mobility and context-aware services. The fifth set of chapters contains new works in the area of Internet delivery and switching systems. The following chapters of the QShine part of the volume are devoted to papers in the areas of resource management in wireless networks, overlay, P2P and SOA arc- tectures. Some works also deal with the optimization of quality of service and energy consumption in WLAN and sensor networks and on the design of a mobility support in mesh networks.
Wewelcomeyoutothejointproceedingsofthe8thNEW2AN2008(NextGene- tionTeletra?candWired/WirelessAdvancedNetworking)andthe1struSMART 2008conferencesheldin St. Petersburg, Russia onSeptember 1-5,2008. This year NEW2AN features signi?cant contributions to various aspects of networking. The topics presented encompass several layers of communication networks: from the physical layer to transport protocols. In particular, issues of QoS in wireless and IP-based multi-service networks are dealt with. Cross-layer optimization and tra?c characterization are also addressed within the program. It is also worth mentioning the emphasis on wireless networks, including, but not limited to, cellular networks, wireless local area networks, personal area networks, mobile ad hoc networks, and sensor networks. The NEW2AN 2008 call for papers attracted 60 papers from 19 countries, resulting in an acceptance ratio of 35%. With the help of the excellent Technical Program Committee and a number of associated reviewers, the best 21 hi- quality papers were selected for publication. The conference was organized in 7 single-track sessions. We wish to thank the Technical Program Committee members of each of the conferences and the associated reviewers for their hard work and important contribution to the conference. The ?rst Russian Conference on Smart Spaces, ruSMART 2008, was the ?rst conference in Russia to address this topic. It aimed to attract academic and industrial researchers to an emerging area of Smart Spaces that creates c- pletely new opportunities for making fully-customized applications and services for the users. The conference was a meeting place for leading experts from top a?liationsaroundthe world.Itattractedactiveparticipationanda strongint- estfromRussianattendees, whohaveagoodreputationforhigh-qualityresearch and business in innovative service creation and applications developme
Scheduled transportation networks give rise to very complex and large-scale networkoptimization problems requiring innovative solution techniques and ideas from mathematical optimization and theoretical computer science. Examples of scheduled transportation include bus, ferry, airline, and railway networks, with the latter being a prime application domain that provides a fair amount of the most complex and largest instances of such optimization problems. Scheduled transport optimization deals with planning and scheduling problems over several time horizons, and substantial progress has been made for strategic planning and scheduling problems in all transportation domains. This state-of-the-art survey presents the outcome of an open call for contributions asking for either research papers or state-of-the-art survey articles. We received 24 submissions that underwent two rounds of the standard peer-review process, out of which 18 were finally accepted for publication. The volume is organized in four parts: Robustness and Recoverability, Robust Timetabling and Route Planning, Robust Planning Under Scarce Resources, and Online Planning: Delay and Disruption Management.
The 14th International Conference on Implementation and Application of - tomata (CIAA 2009) was held in NICTA's Neville Roach Laboratory at the University of New South Wales, Sydney, Australia during July 14-17, 2009. This volume of Lecture Notes in Computer Science contains the papers that were presented at CIAA 2009, as well as abstracts of the posters and short papers that were presented at the conference. The volume also includes papers orextendedabstractsofthethreeinvitedtalkspresentedbyGonzalo Navarro on ImplementationandApplicationofAutomatainStringProcessing, byChristoph Koch on Applications of Automata in XML Processing, and by Helmut Seidl on Program Analysis Through Finite Tree Automata. The 23 regular papers were selected from 42 submissions covering various ?elds in the application, implementation, and theory of automata and related structures. This year, six additional papers were selected as "short papers"; at the conference these were allocated the same presentation length as r- ular papers. Each paper was reviewed by at least three Program Committee members, with the assistance of external referees. Papers were submitted by - thors from the following countries: Australia, Austria, Belgium, Brazil, Canada, China, Czech Republic, Finland, France, Germany, India, Italy, Republic of - rea, Japan, Latvia, TheNetherlands, Portugal, RussianFederation, Spain, South Africa, Turkey, United Arab Emirates, and the USA.
This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2009), which was held in Venice, Italy, during October 27-28, 2009. DSOM 2009 was the 20th event in a series of annual workshops. It followed in the footsteps of previous successful meetings, the most recent of which were held on Samos, Greece (DSOM 2008), San Jos e, California, USA (DSOM 2007), Dublin, Ireland (DSOM 2006), Barcelona, Spain (DSOM 2005), and Davis, C- ifornia, USA (DSOM 2004). The goal of the DSOM workshops is to bring - gether researchersfromindustry andacademia workingin the areasofnetworks, systems, and service management, to discuss recent advances and foster future growth. In contrast to the larger management conferences, such as IM (Inter- tional Symposium on Integrated Network Management) and NOMS (Network OperationsandManagementSymposium),DSOMworkshopshaveasingle-track program in order to stimulate more intense interaction among participants.
Updated and expanded, Bayesian Artificial Intelligence, Second Edition provides a practical and accessible introduction to the main concepts, foundation, and applications of Bayesian networks. It focuses on both the causal discovery of networks and Bayesian inference procedures. Adopting a causal interpretation of Bayesian networks, the authors discuss the use of Bayesian networks for causal modeling. They also draw on their own applied research to illustrate various applications of the technology. New to the Second Edition New chapter on Bayesian network classifiers New section on object-oriented Bayesian networks New section that addresses foundational problems with causal discovery and Markov blanket discovery New section that covers methods of evaluating causal discovery programs Discussions of many common modeling errors New applications and case studies More coverage on the uses of causal interventions to understand and reason with causal Bayesian networks Illustrated with real case studies, the second edition of this bestseller continues to cover the groundwork of Bayesian networks. It presents the elements of Bayesian network technology, automated causal discovery, and learning probabilities from data and shows how to employ these technologies to develop probabilistic expert systems. Web Resource The book's website at www.csse.monash.edu.au/bai/book/book.html offers a variety of supplemental materials, including example Bayesian networks and data sets. Instructors can email the authors for sample solutions to many of the problems in the text.
Going beyond isolated research ideas and design experiences, Designing Network On-Chip Architectures in the Nanoscale Era covers the foundations and design methods of network on-chip (NoC) technology. The contributors draw on their own lessons learned to provide strong practical guidance on various design issues. Exploring the design process of the network, the first part of the book focuses on basic aspects of switch architecture and design, topology selection, and routing implementation. In the second part, contributors discuss their experiences in the industry, offering a roadmap to recent products. They describe Tilera's TILE family of multicore processors, novel Intel products and research prototypes, and the TRIPS operand network (OPN). The last part reveals state-of-the-art solutions to hardware-related issues and explains how to efficiently implement the programming model at the network interface. In the appendix, the microarchitectural details of two switch architectures targeting multiprocessor system-on-chips (MPSoCs) and chip multiprocessors (CMPs) can be used as an experimental platform for running tests. A stepping stone to the evolution of future chip architectures, this volume provides a how-to guide for designers of current NoCs as well as designers involved with 2015 computing platforms. It cohesively brings together fundamental design issues, alternative design paradigms and techniques, and the main design tradeoffs-consistently focusing on topics most pertinent to real-world NoC designers.
In view of the incessant growth of data and knowledge and the continued diversifi- tion of information dissemination on a global scale, scalability has become a ma- stream research area in computer science and information systems. The ICST INFO- SCALE conference is one of the premier forums for presenting new and exciting research related to all aspects of scalability, including system architecture, resource management, data management, networking, and performance. As the fourth conf- ence in the series, INFOSCALE 2009 was held in Hong Kong on June 10 and 11, 2009. The articles presented in this volume focus on a wide range of scalability issues and new approaches to tackle problems arising from the ever-growing size and c- plexity of information of all kind. More than 60 manuscripts were submitted, and the Program Committee selected 22 papers for presentation at the conference. Each s- mission was reviewed by three members of the Technical Program Committee.
TheSAMOSworkshopisaninternationalgatheringofhighlyquali?edresearchers from academia and industry, sharing their ideas in a 3-day lively discussion. The workshop meeting is one of two co-located events-the other event being the IC-SAMOS. The workshop is unique in the sense that not only solved research problems are presented and discussed, but also (partly) unsolved problems and in-depth topical reviews can be unleashed in the scienti?c arena. Consequently, the workshopprovidesthe participantswithanenvironmentwherecollaboration rather than competition is fostered. The workshopwas established in 2001 by ProfessorStamatis Vassiliadis with thegoalsoutlinedaboveinmind, andlocatedinoneofthemostbeautifulislands oftheAegean.Therichhistoricalandculturalenvironmentoftheisland, coupled with the intimate atmosphere and the slow pace of a small village by the sea in the middle of the Greek summer, provide a very conducive environment where ideas can be exchangedand sharedfreely. The workshop, since its inception, has emphasized high-quality contributions, and it has grown to accommodate two parallel tracks and a number of invited sessions. This year, the workshopcelebratedits eighthanniversary, and it attracted24 contributionscarefullyselected outof62 submitted worksfor anacceptancerate of 38.7%. Each submission was thoroughly reviewed by at least three reviewers and considered by the international Program Committee during its meeting at Delft in March |
You may like...
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier
Paperback
Leading with Courage - Daily Reminders…
Matthew White, Judith Bell
Hardcover
|