![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Systems analysis & design
The set of papers collected in this issue originated from the AGERE! Workshop series - the last edition was held in 2017 - and concern the application of actor-based approaches to mainstream application domains and the discussion of related issues. The issue is divided into two parts. The first part concerns Web Programming; Data-Intensive Parallel Programming; Mobile Computing; Self-Organizing Systems and the second part concerns Scheduling; Debugging; Communication and Coordination; Monitoring.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2018, held in St. Malo, France, in September 2018. The 21 full and 6 short papers plus 2 invited talks presented in this volume were carefully reviewed and selected from 52 submissions. The contributions were organized in topical sections named: on ad-hoc, mobile and wireless sensor, networks and computing.
Recognized as an "Optional" title by Choice for their January 2021 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. Success is driven through collaboration. The field of Industrial and Systems Engineering has evolved as a major engineering field with interdisciplinary strength drawn from effective utilization, process improvement, optimization, design, and management of complex systems. It is a broad discipline that is important to nearly every attempt to solve problems facing the needs of society and the welfare of humanity. In order to carry this forward, successful collaborations are needed between industry, government, and academia. This book brings together an international group of distinguished practitioners and academics in manufacturing, healthcare, logistics, and energy sectors to examine what enables successful collaborations. The book is divided into two key parts: 1) partnerships, frameworks, and leadership; and 2) engineering applications and case studies. Part I highlights some of the ways partnerships emerge between those seeking to innovate and educate in industrial and systems engineering, some useful frameworks and methodologies, as well as some of the ideas and practices that undergird leadership in the profession. Part II provides case studies and applications to illustrate the power of the partnerships between academia and practice in industrial and systems engineering. Features Examines the success from multiple industries Provides frameworks for building teams and avoiding pitfalls Contains international perspectives of success Uses collaborative approaches from industry, government, and academia Includes real world case studies illustrating the enabling factors Offers engineering education and student-centric takeaways
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
This volume constitutes the refereed proceedings of the 25th European Conference on Systems, Software and Services Process Improvement, EuroSPI conference, held in Bilbao, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 95 submissions. They are organized in topical sections on SPI context and agility, SPI and safety testing, SPI and management issues, SPI and assessment, SPI and safety critical, gamifySPI, SPI in industry 4.0, best practices in implementing traceability, good and bad practices in improvement, safety and security, experiences with agile and lean, standards and assessment models,team skills and diversity strategies, SPI in medical device industry, empowering the future infrastructure.
Follow this step-by-step guide for creating a continuous delivery pipeline using all of the new features in Jenkins 2.0 such as Pipeline as a Code, multi-branch pipeline, and more. You will learn three crucial elements for achieving a faster software delivery pipeline: a fungible build/test environment, manageable and reproducible pipelines, and a scalable build/test infrastructure. Pro Continuous Delivery demonstrates how to create a highly available, active/passive Jenkins server using some niche technologies. What You'll Learn Create a highly available, active/passive Jenkins server using CoreOS and Docker, and using Pacemaker and Corosync Use a Jenkins multi-branch pipeline to automatically perform continuous integration whenever there is a new branch in your source control system Describe your continuous delivery pipeline with Jenkinsfile Host Jenkins server on a cloud solution Run Jenkins inside a container using Docker Discover how the distributed nature of Git and the "merge before build" feature of Jenkins can be used to implement gated check-in Implement a scalable build farm using Docker and Kubernetes Who This Book Is For You have experience implementing continuous integration and continuous delivery using Jenkins freestyle Jobs and wish to use the new Pipeline as a Code feature introduced in Jenkins 2.0 Your source code is on a Git-like version control system (Git, GitHub, GitLab, etc.) and you wish to leverage the advantages of a multi-branch pipeline in Jenkins Your infrastructure is on a Unix-like platform and you wish to create a scalable, distributed build/test farm using Docker or Kubernetes You are in need of a highly available system for your Jenkins Server using open source tools and technologies
This book constitutes the refereed proceedings of the 15th European Workshop on Computer Performance Engineering, EPEW 2018, held in Paris, France, in October 2018. The 17 papers presented together with the abstracts of two invited talks in this volume were carefully reviewed and selected from 27 submissions. The papers presented at the workshop reflect the diversity of modern performance engineering, with topics ranging from advances in performanceengineering realm, including, dependability and security modeling, performance oriented model verification and testing, hardware and software systems case-studies, applications/extensions of queuing theory and network design
Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.
This volume constitutes the refereed proceedings of the 18th International Conference on Software Process Improvement and Capability Determination, SPICE 2018, held in Tessaloniki, Greece, in October 2018. The 26 full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in the following topical sections: SPI systematic literature reviews; SPI and assessment; SPI methods and reference models; SPI education and management issues; SPI knowledge and change processes; SPI compliance and configuration; SPI and agile; industry short papers.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2017, held in Porto, Portugal, in April 2017. The 12 full papers presented were carefully reviewed and selected from 102 submissions. The mission of ENASE is to be a prime international forum to discuss and publish research findings and IT industry experiences with relation to the evaluation of novel approaches to software engineering. The conference acknowledges necessary changes in systems and software thinking due to contemporary shifts of computing paradigm to e-services, cloud computing, mobile connectivity, business processes, and societal participation.
This book constitutes the thoroughly refereed proceedings of the 24th International Conference on Computer Networks, CN 2017, held in Brunow, Poland, in June 2017. The 35 full papers presented were carefully reviewed and selected from 80 submissions. They are dealing with the topics computer networks; teleinformatics and telecommunications; new technologies; queueing theory; innovative applications.
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field.
This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented were carefully reviewed and selected from 28 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
This volume contains the technical papers presented in the workshops associated with the European Conference on Service-Oriented and Cloud Computing, ESOCC 2016, held in Vienna, Austria, in September 2016: 4th International Workshop on Cloud for IoT, CLloT 2016, Second International Workshop on Cloud Adoption and Migration, CloudWays 2016, First International Workshop on Patterns and Pattern Languages for SOCC: Use and Discovery, PATTWORLD 2016, combined with the First International Workshop on Performance and Conformance of Workflow Engines, PEaCE 2016, IFIP WG SOS Workshop 2016 Rethinking Services ResearCH, ReSeRCH 2016. Furthermore, there is a topical section presenting the results of the PhD Symposium. The abstracts of the presentations held at the European Projects Forum, EU Projects 2016, are included in the back-matter of the volume. The 15 full papers included in this volume were carefully reviewed and selected from 49 submissions. They focus on specific topics in service-oriented and cloud computing domains such as limits and/or advantages of existing cloud solutions, future internet technologies, efficient and adaptive deployment and management of service-based applications across multiple clouds, novel cloud service migration practices and solutions, digitization of enterprises in the cloud computing era, federated cloud networking services.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016. The 15 revised full papers presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
This book presents the latest research on the software crowdsourcing approach to develop large and complex software in a cloud-based platform. It develops the fundamental principles, management organization and processes, and a cloud-based infrastructure to support this new software development approach. The book examines a variety of issues in software crowdsourcing processes, including software quality, costs, diversity of solutions, and the competitive nature of crowdsourcing processes. Furthermore, the book outlines a research roadmap of this emerging field, including all the key technology and management issues for the foreseeable future. Crowdsourcing, as demonstrated by Wikipedia and Facebook for online web applications, has shown promising results for a variety of applications, including healthcare, business, gold mining exploration, education, and software development. Software crowdsourcing is emerging as a promising solution to designing, developing and maintaining software. Preliminary software crowdsourcing practices and platforms, including Apple's App Store and TopCoder, demonstrate the advantages of crowdsourcing in terms of software ecosystem expansion and product quality improvement.
This book introduces a new notion of replacement in maintenance and reliability theory. Replacement Overtime, where replacement is done at the first completion of a working cycle over a planned time, is a new research topic in maintenance theory and also serves to provide a fresh optimization technique in reliability engineering. In comparing replacement overtime with standard and random replacement techniques theoretically and numerically, 'Maintenance Overtime Policies in Reliability Theory' highlights the key improvements to be gained by adopting this new approach and shows how they can be applied to inspection policies, parallel systems and cumulative damage models. Utilizing the latest research in replacement overtime by internationally recognized experts, the reader will be introduced to new topics and methods, and learn how to apply this knowledge practically to actual reliability models. This book will serve as an essential guide to a new subject of study for graduate students and researchers and also provides a useful guide for reliability engineers and managers who have difficulties in maintenance of computer and production systems with random working cycles.
In this publication a widespread phenomenon is studied: in many usage scenarios modern complex machines show a significant difference between the maximum sustainable performance available in well specified environments and the average performance many users experience in their everyday interaction with the machine. This performance gap appears to be increasing with technical progress and performance of machines. Although this situation is probably well known to many readers -- and very often not so quietly endured -- it was not studied systematically so far. This publication describes the conceptual background of the performance gap in a very general way. It develops a semi-quantitative description and points to approaches to reduce the performance gap in current and future environments. Process executives, engineers and system analysts will hopefully benefit from this approach especially in the dynamic environments envisioned in initiatives like the German Industrie 4.0. In the technology network Intelligent Technical Systems OstWestfalenLippe (short: it's OWL) around 200 companies, universities, research institutions and organisations have joined forces to jointly shape the innovative leap from mechatronics to intelligent technical systems. Together they develop approaches and technologies for intelligent products and production processes, smart services and the working world of the future. The spectrum ranges from automation and drive solutions to machines, vehicles, automats and household appliances to networked production plants and platforms. This creates a unique technology platform that enables companies to increase the reliability, resource efficiency and user-friendliness of their products and production systems and tap the potential of digital transformation.
This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities across more than 20 countries, and from research carried out by Maxeler Technologies, Inc. Topics and features: presents a thorough introduction to DataFlow supercomputing for big data problems; reviews the latest research on the DataFlow architecture and its applications; introduces a new method for the rapid handling of real-world challenges involving large datasets; provides a case study on the use of the new approach to accelerate the Cooley-Tukey algorithm on a DataFlow machine; includes a step-by-step guide to the web-based integrated development environment WebIDE.
This book describes the use of free air cooling to improve the efficiency of, and cooling of, equipment for use in telecom infrastructures. Discussed at length is the cooling of communication installation rooms such as data centers or base stations, and this is intended as a valuable tool for the people designing and manufacturing key parts of communication networks. This book provides an introduction to current cooling methods used for energy reduction, and also compares present cooling methods in use in the field. The qualification methods and standard reliability assessments are reviewed, and their inability to assess the risks of free air cooling is discussed. The method of identifying the risks associated with free air cooling on equipment performance and reliability is introduced. A novel method of assessment for free air cooling is also proposed that utilizes prognostics and health management (PHM). This book also: Describes how the implementation of free air cooling can save energy for cooling within the telecommunications infrastructure. Analyzes the potential risks and failures of mechanisms possible in the implementation of free air cooling, which benefits manufacturers and equipment designers. Presents prognostics-based assessments to identify and mitigate the risks of telecommunications equipment under free air cooling conditions, which can provide the early warning of equipment failures at operation stage without disturbing the data centers' service. Optimum Cooling for Data Centers is an ideal book for researchers and engineers interested in designing and manufacturing equipment for use in telecom infrastructures.
The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. Handbook of Mobile Ad Hoc Networks for Mobility Models introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. Handbook of Mobile Ad Hoc Networks for Mobility Models is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.
This book constitutes the refereed proceedings of the 11th Annual Conference on Advanced Computer Architecture, ACA 2016, held in Weihai, China, in August 2016. The 17 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers address issues such as processors and circuits; high performance computing; GPUs and accelerators; cloud and data centers; energy and reliability; intelligence computing and mobile computing. |
You may like...
Handbook of Research on 5G Networks and…
Augustine O Nwajana, Isibor Kennedy Ihianle
Hardcover
R7,962
Discovery Miles 79 620
Loose Leaf for Fundamentals of Electric…
Charles Alexander, Matthew Sadiku
Loose-leaf
R5,176
Discovery Miles 51 760
Implementing Data Analytics and…
Chintan Bhatt, Neeraj Kumar, …
Hardcover
R5,931
Discovery Miles 59 310
Cases on Lean Thinking Applications in…
Eduardo Guilherme Satolo, Robisom Damasceno Calado
Hardcover
R5,991
Discovery Miles 59 910
|