![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Systems analysis & design
In the last decade of Computer Science development, we can observe a growing interest in fault-tolerant computing. This interest is the result of a rising number of appl'ications where reliable operation of computing systems is an essential requirement. Besides basic research in the field of fault-tolerant computing, there is an increasing num- ber of systems especially designed to achieve fault-tolerance. It is the objective of this conference to offer a survey of present research and development activities in these areas. The second GI/NTG/GM~ Conference on Fault-Tolerant Computing Systems has had a preparatory time of about two years. In March 1982, the first GI conference concerning fault-tolerant computing systems was held in Munich. One of the results of the conference was to bring an organiza- tional framework to the FTC community in Germany. This led to the founding of the common interest group "Fault-Tolerant Computing Systems" of the Gesellschaft fur Informatik (GI), the Nachrichtentechnische Gesellschaft (NTG), and the Gesellschaft fur MeB- und Regelungstechnik (VDI/VDE-GMR) in November 1982. At that time, it was also decided to schedule a biannual conference on fault-tolerant computing systems. One of the goals of this second conference is to strengthen the relations with the international FTC community; thus, the call for papers was extended not only to German-speaking countries, but to other countries as well.
The accelerated development of faster and cheaper electronic components faces the software designer with new challenges. One of them is to predict the viability of current architecture and the performance of current operating systems on CPUs able to operate at instruction-per-second rates about one order of magnitude higher than those available today. For this task we need to understand not only the principle of such an operating system but also the detailed mechanics and the scenario of actions determined by the random occurence of asynchronous events. Also we want to understand how this scenario changes with varying CPU and I/O device speed. One can realise that existing tools are only of limited help in pursuing this goal. For IBM/370 rNS systems there are several software monitors available e. g. the System Activity Measurement Facility ~/1 /4/1, the Resource Measurement Facility CRMF /5/) or traces like the Generalised Trace Facility CGTF /6/) and hardware monitors like the System Measurement Instrument (SMI) which all address mainly the aspect of system tuning. Software monitors can efficiently observe length of queues and resource utilisation percentages but will unavoidably distort the time scale by absorbing resources for their own execution. Hardware monitors do not distort the time scale but have only limited possibilities of observing the logic of operations. Their best use is in counting occurences of a limited number of well specified events. Moreover, none of these tools will permit the simulation of processor speeds that differ from the real processor speed.
Real-time systems are used in a wide range of applications, including control, sensing, multimedia, etc. Scheduling is a central problem for these computing/communication systems since it is responsible for software execution in a timely manner. This book, the second of two volumes on the subject, brings together knowledge on specific topics and discusses the recent advances for some of them. It addresses foundations as well as the latest advances and findings in real-time scheduling, giving comprehensive references to important papers, but the chapters are short and not overloaded with confusing details. Coverage includes scheduling approaches for networks and for energy autonomous systems. Other sophisticated issues, such as feedback control scheduling and probabilistic scheduling, are also addressed. This book can serve as a textbook for courses on the topic in bachelor's degrees and in more advanced master's degree programs. It also provides a reference for computer scientists and engineers involved in the design or the development of Cyber-Physical Systems which require up-to-date real-time scheduling solutions.
This book is dedicated to metaheuristics as applied to vehicle routing problems. Several implementations are given as illustrative examples, along with applications to several typical vehicle routing problems. As a first step, a general presentation intends to make the reader more familiar with the related field of logistics and combinatorial optimization. This preamble is completed with a description of significant heuristic methods classically used to provide feasible solutions quickly, and local improvement moves widely used to search for enhanced solutions. The overview of these fundamentals allows appreciating the core of the work devoted to an analysis of metaheuristic methods for vehicle routing problems. Those methods are exposed according to their feature of working either on a sequence of single solutions, or on a set of solutions, or even by hybridizing metaheuristic approaches with others kind of methods.
A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.
Digital Logic with an Introduction to Verilog and FPGA-Based Design provides basic knowledge of field programmable gate array (FPGA) design and implementation using Verilog, a hardware description language (HDL) commonly used in the design and verification of digital circuits. Emphasizing fundamental principles, this student-friendly textbook is an ideal resource for introductory digital logic courses. Chapters offer clear explanations of key concepts and step-by-step procedures that illustrate the real-world application of FPGA-based design. Designed for beginning students familiar with DC circuits and the C programming language, the text begins by describing of basic terminologies and essential concepts of digital integrated circuits using transistors. Subsequent chapters cover device level and logic level design in detail, including combinational and sequential circuits used in the design of microcontrollers and microprocessors. Topics include Boolean algebra and functions, analysis and design of sequential circuits using logic gates, FPGA-based implementation using CAD software tools, and combinational logic design using various HDLs with focus on Verilog.
This book takes an in-depth look at the emerging technologies that are transforming the way clinicians manage patients, while at the same time emphasizing that the best practitioners use both artificial and human intelligence to make decisions. AI and machine learning are explored at length, with plain clinical English explanations of convolutional neural networks, back propagation, and digital image analysis. Real-world examples of how these tools are being employed are also discussed, including their value in diagnosing diabetic retinopathy, melanoma, breast cancer, cancer metastasis, and colorectal cancer, as well as in managing severe sepsis. With all the enthusiasm about AI and machine learning, it was also necessary to outline some of criticisms, obstacles, and limitations of these new tools. Among the criticisms discussed: the relative lack of hard scientific evidence supporting some of the latest algorithms and the so-called black box problem. A chapter on data analytics takes a deep dive into new ways to conduct subgroup analysis and how it's forcing healthcare executives to rethink the way they apply the results of large clinical trials to everyday medical practice. This re-evaluation is slowly affecting the way diabetes, heart disease, hypertension, and cancer are treated. The research discussed also suggests that data analytics will impact emergency medicine, medication management, and healthcare costs. An examination of the diagnostic reasoning process itself looks at how diagnostic errors are measured, what technological and cognitive errors are to blame, and what solutions are most likely to improve the process. It explores Type 1 and Type 2 reasoning methods; cognitive mistakes like availability bias, affective bias, and anchoring; and potential solutions such as the Human Diagnosis Project. Finally, the book explores the role of systems biology and precision medicine in clinical decision support and provides several case studies of how next generation AI is transforming patient care.
As the complexity of today's networked computer systems grows, they become increasingly difficult to understand, predict, and control. Addressing these challenges requires new approaches to building these systems. Adaptive, Dynamic, and Resilient Systems supplies readers with various perspectives of the critical infrastructure that systems of networked computers rely on. It introduces the key issues, describes their interrelationships, and presents new research in support of these areas. The book presents the insights of a different group of international experts in each chapter. Reporting on recent developments in adaptive systems, it begins with a survey of application fields. It explains the requirements of such fields in terms of adaptation and resilience. It also provides some abstract relationship graphs that illustrate the key attributes of distributed systems to supply you with a better understanding of these factors and their dependencies. The text examines resilient adaptive systems from the perspectives of mobile, infrastructure, and enterprise systems and protecting critical infrastructure. It details various approaches for building adaptive, dynamic, and resilient systems-including agile, grid, and autonomic computing; multi-agent-based and biologically inspired approaches; and self-organizing systems. The book includes many stories of successful applications that illustrate a diversified range of cutting-edge approaches. It concludes by covering related topics and techniques that can help to boost adaptation and resilience in your systems.
Dokumentenmanagementprojekte sind ganzheitliche Projekte. Organisatorische, technische und menschliche Faktoren entscheiden uber Erfolg oder Mierfolg. Das DMS-Handbuch hilft fruhzeitig Fehler zu erkennen und zu vermeiden. Es ist eine Pflichtlekture fur jeden, der sich mit dem Gedanken tragt, ein Dokumentenmanagementsystem einzufuhren. Schritt fur Schritt wird der Leser durch die einzelnen Projektstufen gefuhrt. Mit Hilfe von Tabellen, Charts und Diagrammen wird eine komplexe Materie ubersichtlich dargestellt. Ein ausfuhrliches Glossar mit Begriffserklarungen der Fachtermini und eine Fulle von Checklisten machen das Buch zum unentbehrlichen Begleiter.
Enterprise developers face several challenges when it comes to building serverless applications, such as integrating applications and building container images from source. With more than 60 practical recipes, this cookbook helps you solve these issues with Knative--the first serverless platform natively designed for Kubernetes. Each recipe contains detailed examples and exercises, along with a discussion of how and why it works. If you have a good understanding of serverless computing and Kubernetes core resources such as deployment, services, routes, and replicas, the recipes in this cookbook show you how to apply Knative in real enterprise application development. Authors Kamesh Sampath and Burr Sutter include chapters on autoscaling, build and eventing, observability, Knative on OpenShift, and more. With this cookbook, you'll learn how to: Efficiently build, deploy, and manage modern serverless workloads Apply Knative in real enterprise scenarios, including advanced eventing Monitor your Knative serverless applications effectively Integrate Knative with CI/CD principles, such as using pipelines for faster, more successful production deployments Deploy a rich ecosystem of enterprise integration patterns and connectors in Apache Camel K as Kubernetes and Knative components
An accessible introduction to computer systems and architecture
Embedded systems take over complex control and data processing tasks in diverse application ?elds such as automotive, avionics, consumer products, and telec- munications. They are the primary driver for improving overall system safety, ef?ciency, and comfort. The demand for further improvement in these aspects can only be satis?ed by designing embedded systems of increasing complexity, which in turn necessitates the development of new system design methodologies based on speci?cation, design, and veri?cation languages. The objective of the book at hand is to provide researchers and designers with an overview of current research trends, results, and application experiences in c- puter languages for embedded systems. The book builds upon the most relevant contributions to the 2008 conference Forum on Design Languages (FDL), the p- mier international conference specializing in this ?eld. These contributions have been selected based on the results of reviews provided by leading experts from - search and industry. In many cases, the authors have improved their original work by adding breadth, depth, or explanation.
Thoroughly classroom-tested and proven to be a valuable self-study companion, Linear Control System Analysis and Design: Sixth Edition provides an intensive overview of modern control theory and conventional control system design using in-depth explanations, diagrams, calculations, and tables. Keeping mathematics to a minimum, the book is designed with the undergraduate in mind, first building a foundation, then bridging the gap between control theory and its real-world application. Computer-aided design accuracy checks (CADAC) are used throughout the text to enhance computer literacy. Each CADAC uses fundamental concepts to ensure the viability of a computer solution. Completely updated and packed with student-friendly features, the sixth edition presents a range of updated examples using MATLAB (R), as well as an appendix listing MATLAB functions for optimizing control system analysis and design. Over 75 percent of the problems presented in the previous edition have been revised or replaced.
Systems Analysis and Design, 8th Edition offers students a hands-on introduction to the core concepts of systems analysis and systems design. Following a project-based approach written to mimic real-world workflow, the text includes a multitude of cases and examples, in-depth explanations, and special features that highlight crucial concepts and emphasize the application of fundamental theory to real projects.
A solid introduction to the practices, plans, and skills required for developing a smart system architecture Information architecture combines IT skills with business skills in order to align the IT structure of an organization with the mission, goals, and objectives of its business. This friendly introduction to IT architecture walks you through the myriad issues and complex decisions that many organizations face when setting up IT systems to work in sync with business procedures. Veteran IT professional and author Kirk Hausman explains the business value behind IT architecture and provides you with an action plan for implementing IT architecture procedures in an organization. You'll explore the many challenges that organizations face as they attempt to use technology to enhance their business's productivity so that you can gain a solid understanding of the elements that are required to plan and create an architecture that meets specific business goals.Defines IT architecture as a blend of IT skills and business skills that focuses on business optimization, business architecture, performance management, and organizational structureUncovers and examines every topic within IT architecture including network, system, data, services, application, and moreAddresses the challenges that organizations face when attempting to use information technology to enable profitability and business continuity While companies look to technology more than ever to enhance productivity, you should look to "IT Architecture For Dummies" for guidance in this field.
This book constitutes the refereed proceedings of the 22nd International Conference on Innovations for Community Services, I4CS 2022, held in Delft, The Netherlands, in June 2022. The 15 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 43 submissions. Three invited papers were also included in the volume. The papers focus on topics such as services for critical infrastructure; network architecture for communities; applications and services supporting work and life; community data and visualization; technology empowers industry processes; and future community support.
Recognized as a "Recommended" title by Choice for their October 2020 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. This book covers tools and techniques used for developing mathematical methods and modelling related to real-life situations. It brings forward significant aspects of mathematical research by using different mathematical methods such as analytical, computational, and numerical with relevance or applications in engineering and applied sciences. Presents theory, methods, and applications in a balanced manner Includes the basic developments with full details Contains the most recent advances and offers enough references for further study Written in a self-contained style and provides proof of necessary results Offers research problems to help early career researchers prepare research proposals Mathematical Methods in Engineering and Applied Sciences makes available for the audience, several relevant topics in one place necessary for crucial understanding of research problems of an applied nature. This should attract the attention of general readers, mathematicians, and engineers interested in new tools and techniques required for developing more accurate mathematical methods and modelling corresponding to real-life situations.
The 4-volume set LNCS 13534, 13535, 13536 and 13537 constitutes the refereed proceedings of the 5th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2022, held in Shenzhen, China, in November 2022. The 233 full papers presented were carefully reviewed and selected from 564 submissions. The papers have been organized in the following topical sections: Theories and Feature Extraction; Machine learning, Multimedia and Multimodal; Optimization and Neural Network and Deep Learning; Biomedical Image Processing and Analysis; Pattern Classification and Clustering; 3D Computer Vision and Reconstruction, Robots and Autonomous Driving; Recognition, Remote Sensing; Vision Analysis and Understanding; Image Processing and Low-level Vision; Object Detection, Segmentation and Tracking.
Dieses Lehrbuch bietet eine umfassende EinfA1/4hrung in Grundlagen und Methoden der Computerlinguistik und stellt die wichtigsten Anwendungsgebiete in der Sprachtechnologie vor. Es richtet sich gleichermaAen an Studierende der Computerlinguistik und verwandter FAcher mit Bezug zur Verarbeitung natA1/4rlicher Sprache wie an Entwickler sprachverarbeitender Systeme. FA1/4r die dritte Auflage wurden sAmtliche Kapitel A1/4berarbeitet und aktualisiert sowie zum Teil zu eigenstAndigen, neuen Kapiteln zusammengefA1/4hrt. Insbesondere trAgt die dritte Auflage der rasanten Entwicklung in der Computerlinguistik und Sprachtechnologie durch eine stArkere Fokussierung auf statistische Grundlagen und Methoden Rechnung.
This open access book constitutes the proceedings of the 25th International Conference on Fundamental Approaches to Software Engineering, FASE 2022, which was held during April 4-5, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022. The 17 regular papers presented in this volume were carefully reviewed and selected from 64 submissions. The proceedings also contain 3 contributions from the Test-Comp Competition. The papers deal with the foundations on which software engineering is built, including topics like software engineering as an engineering discipline, requirements engineering, software architectures, software quality, model-driven development, software processes, software evolution, AI-based software engineering, and the specification, design, and implementation of particular classes of systems, such as (self-)adaptive, collaborative, AI, embedded, distributed, mobile, pervasive, cyber-physical, or service-oriented applications. |
![]() ![]() You may like...
Productivity and Inequality
William H. Greene, Lynda Khalaf, …
Hardcover
R4,667
Discovery Miles 46 670
Financial Economics - A Concise…
Thorsten Hens, Marc Oliver Rieger
Hardcover
R3,450
Discovery Miles 34 500
Tripping Points on the Roads to Outwit…
Yair Sharan, Ted J. Gordon, …
Hardcover
R3,621
Discovery Miles 36 210
|