![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Systems analysis & design
This book constitutes the proceedings of the 14th European Conference on Modelling Foundations and Applications, ECMFA 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 19 papers presented in this volume were carefully reviewed and selected from 45 submissions. The cover topics such as (bidirectional and unidirectional) model transformations, model management, re-engineering, modelling environments, verification and validation, and domain-specific modelling w.r.t. business processes, automotive software, and safety-critical software.
This book introduces a novel framework for accurately modeling the errors in nanoscale CMOS technology and developing a smooth tool flow at high-level design abstractions to estimate and mitigate the effects of errors. The book presents novel techniques for high-level fault simulation and reliability estimation as well as architecture-level and system-level fault tolerant designs. It also presents a survey of state-of-the-art problems and solutions, offering insights into reliability issues in digital design and their cross-layer countermeasures.
This book focuses on one of the most important aspects of electrical propulsion systems - the creation of highly reliable safety-critical traction electrical drives. It discusses the methods and models for analysis and optimization of reliability and fault tolerance indices, based on which, it proposes and assesses methods for improving the availability, fault tolerance and performance of traction electric drives.
This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. The authors first show how the system software interacts with the hardware to tolerate faults. They analyze and further develop the theory of fault tolerance to understand the different ways to increase the reliability of a system, with special attention on the role of system software in this process. They further develop the general algorithm of fault tolerance (GAFT) with its three main processes: hardware checking, preparation for recovery, and the recovery procedure. For each of the three processes, they analyze the requirements and properties theoretically and give possible implementation scenarios and system software support required. Based on the theoretical results, the authors derive an Oberon-based programming language with direct support of the three processes of GAFT. In the last part of this book, they introduce a simulator, using it as a proof of concept implementation of a novel fault tolerant processor architecture (ERRIC) and its newly developed runtime system feature-wise and performance-wise. The content applies to industries such as military, aviation, intensive health care, industrial control, space exploration, etc.
This book focuses on the development and use of interoperability standards related to healthcare information technology (HIT) and provides in-depth discussion of the associated essential aspects. The book explains the principles of conformance, examining how to improve the content of healthcare data exchange standards (including HL7 v2.x, V3/CDA, FHIR, CTS2, DICOM, EDIFACT, and ebXML), the rigor of conformance testing, and the interoperability capabilities of healthcare applications for the benefit of healthcare professionals who use HIT, developers of HIT applications, and healthcare consumers who aspire to be recipients of safe and effective health services facilitated through meaningful use of well-designed HIT. Readers will understand the common terms interoperability, conformance, compliance and compatibility, and be prepared to design and implement their own complex interoperable healthcare information system. Chapters address the practical aspects of the subject matter to enable application of previously theoretical concepts. The book provides real-world, concrete examples to explain how to apply the information, and includes many diagrams to illustrate relationships of entities and concepts described in the text. Designed for professionals and practitioners, this book is appropriate for implementers and developers of HIT, technical staff of information technology vendors participating in the development of standards and profiling initiatives, informatics professionals who design conformance testing tools, staff of information technology departments in healthcare institutions, and experts involved in standards development. Healthcare providers and leadership of provider organizations seeking a better understanding of conformance, interoperability, and IT certification processes will benefit from this book, as will students studying healthcare information technology.
The research and its outcomes presented in this collection focus on various aspects of high-performance computing (HPC) software and its development which is confronted with various challenges as today's supercomputer technology heads towards exascale computing. The individual chapters address one or more of the research directions (1) computational algorithms, (2) system software, (3) application software, (4) data management and exploration, (5) programming, and (6) software tools. The collection thereby highlights pioneering research findings as well as innovative concepts in exascale software development that have been conducted under the umbrella of the priority programme "Software for Exascale Computing" (SPPEXA) of the German Research Foundation (DFG) and that have been presented at the SPPEXA Symposium, Jan 25-27 2016, in Munich. The book has an interdisciplinary appeal: scholars from computational sub-fields in computer science, mathematics, physics, or engineering will find it of particular interest.
The control-flow issues presented in this textbook are extremely relevant in modern computer languages and programming styles. In addition to the basic control-flow mechanisms, virtually all new computer languages provide some form of exceptional control flow to support robust programming introduced in this textbook. Also, concurrency capabilities are appearing with increasing frequency in both new and old programming languages, and are covered in this book. Understanding Control Flow: With Concurrent Programming Using C++ starts with looping, and works through each of the basic control-flow concepts, examining why each is fundamental and where it is useful. Time is spent on each concept according to its level of difficulty. Examples and exercises are also provided in this textbook. New programming methodologies are requiring new forms of control flow, and new programming languages are supporting these methodologies with new control structures, such as the concurrency constructs discussed in this textbook. Most computers now contain multi-threading and multi-cores, while multiple processors and distributed systems are ubiquitous - all of which require advanced programming methodologies to take full advantage of the available parallelism summarized in this textbook. Advance forms of control flow are becoming basic programming skills needed by all programmers, not just graduate students working in the operating systems or database disciplines. This textbook is designed for advanced-level students studying computer science and engineering. Professionals and researchers working in this field, specifically programming and software engineering, will find this book useful as a reference.
This book constitutes the refereed proceedings of the 11th International Conference on Model Transformation, ICMT 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 9 full papers were carefully reviewed and selected from 24 submissions. This book also presents 1 invited paper. The papers include research, application, and tool demonstration papers presented in the context of four sessions on verification of model transformations, model transformation tools, transformation reuse and graph transformations.
Recognized as an "Optional" title by Choice for their January 2021 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. Success is driven through collaboration. The field of Industrial and Systems Engineering has evolved as a major engineering field with interdisciplinary strength drawn from effective utilization, process improvement, optimization, design, and management of complex systems. It is a broad discipline that is important to nearly every attempt to solve problems facing the needs of society and the welfare of humanity. In order to carry this forward, successful collaborations are needed between industry, government, and academia. This book brings together an international group of distinguished practitioners and academics in manufacturing, healthcare, logistics, and energy sectors to examine what enables successful collaborations. The book is divided into two key parts: 1) partnerships, frameworks, and leadership; and 2) engineering applications and case studies. Part I highlights some of the ways partnerships emerge between those seeking to innovate and educate in industrial and systems engineering, some useful frameworks and methodologies, as well as some of the ideas and practices that undergird leadership in the profession. Part II provides case studies and applications to illustrate the power of the partnerships between academia and practice in industrial and systems engineering. Features Examines the success from multiple industries Provides frameworks for building teams and avoiding pitfalls Contains international perspectives of success Uses collaborative approaches from industry, government, and academia Includes real world case studies illustrating the enabling factors Offers engineering education and student-centric takeaways
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. Aside from the technical paper sessions the book is organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications.
This book presents a comprehensive introduction to Internetware, covering aspects ranging from the fundamental principles and engineering methodologies to operational platforms, quality measurements and assurance and future directions. It also includes guidelines and numerous representative real-world case studies that serve as an invaluable reference resource for software engineers involved in the development of Internetware applications. Providing a detailed analysis of current trends in modern software engineering in the Internet, it offers an essential blueprint and an important contribution to the research on software engineering and systems for future Internet computing.
This guide provides a comprehensive overview of High Performance Computing (HPC) to equip students with a full skill set including cluster setup, network selection, and a background of supercomputing competitions. It covers the system, architecture, evaluating approaches, and other practical supercomputing techniques. As the world's largest supercomputing hackathon, the ASC Student Supercomputer Challenge has attracted a growing number of new talent to supercomputing and has greatly promoted communications in the global HPC community. Enclosed in this book, readers will also find how to analyze and optimize supercomputing systems and applications in real science and engineering cases.
The idea of this volume originated from the need to have a book for students to support their training with several tutorials on different aspects of RV. The volume has been organized into seven chapters and the topics covered include an introduction on runtime verification, dynamic analysis of concurrency errors, monitoring events that carry data, runtime error reaction and prevention, monitoring of cyber-physical systems, runtime verification for decentralized and distributed systems and an industrial application of runtime verification techniques in financial transaction systems.
This book constitutes the refereed proceedings of the 11th International Andrei P. Ershov Informatics Conference, PSI 2017, held in Moscow, Russia, in June 2017. The 31 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover various topics related to the foundations of program and system development and analysis, programming methodology and software engineering and information technologies.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016. The 15 revised full papers presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th Pacific Rim Symposium on Image and Video Technology, PSIVT 2017, held in Wuhan, China, in November 2017.The total of 39 revised papers was carefully reviewed and selected from 91 submissions. The Pacific-Rim Symposium on Image and Video Technology (PSIVT) is a high-quality series of symposia that aim at providing a forum for researchers and practitioners who are being involved, or are contributing to theoretical advances or practical implementations in image and video technology.
This book contains extended versions of the best papers presented at the 13th International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications, ICTERI 2017, held in Kyiv, Ukraine, in May 2017. The 11 revised full papers included in this volume were carefully reviewed and selected from 151 initial submissions during several rounds of reviewing. The papers are organized in the following topical sections: modeling and theoretical frameworks; ICT in teaching, learning, and education management; and ICT evaluation and applications.
This book constitutes the refereed proceedings of the 4th International Conference on Tools and Methods for Program Analysis, TMPA 2017, Moscow, Russia, March 3-4, 2017. The 12 revised full papers and 5 revised short papers presented together with three abstracts of keynote talks were carefully reviewed and selected from 51 submissions. The papers deal with topics such as software test automation, static program analysis, verification, dynamic methods of program analysis, testing and analysis of parallel and distributed systems, testing and analysis of high-load and high-availability systems, analysis and verification of hardware and software systems, methods of building quality software, tools for software analysis, testing and verification.
This volume contains a record of some of the lectures and seminars delivered at the Third International School on Engineering Trustworthy Software Systems (SETSS 2017), held in April 2017 at Southwest University in Chongqing, China. The six contributions included in this volume provide an overview of leading-edge research in methods and tools for use in computer system engineering. They have been distilled from six original courses delivered at the school on topics such as: rely/guarantee thinking; Hoare-style specification and verification of object-oriented programs with JML; logic, specification, verification, and interactive proof; software model checking with Automizer; writing programs and proofs; engineering self-adaptive software-intensive systems; and with an additional contribution on the challenges for formal semantic description. The material is useful for postgraduate students, researchers, academics, and industrial engineers, who are interested in the theory and practice of methods and tools for the design and programming of trustworthy software systems.
In this publication a widespread phenomenon is studied: in many usage scenarios modern complex machines show a significant difference between the maximum sustainable performance available in well specified environments and the average performance many users experience in their everyday interaction with the machine. This performance gap appears to be increasing with technical progress and performance of machines. Although this situation is probably well known to many readers -- and very often not so quietly endured -- it was not studied systematically so far. This publication describes the conceptual background of the performance gap in a very general way. It develops a semi-quantitative description and points to approaches to reduce the performance gap in current and future environments. Process executives, engineers and system analysts will hopefully benefit from this approach especially in the dynamic environments envisioned in initiatives like the German Industrie 4.0. In the technology network Intelligent Technical Systems OstWestfalenLippe (short: it's OWL) around 200 companies, universities, research institutions and organisations have joined forces to jointly shape the innovative leap from mechatronics to intelligent technical systems. Together they develop approaches and technologies for intelligent products and production processes, smart services and the working world of the future. The spectrum ranges from automation and drive solutions to machines, vehicles, automats and household appliances to networked production plants and platforms. This creates a unique technology platform that enables companies to increase the reliability, resource efficiency and user-friendliness of their products and production systems and tap the potential of digital transformation.
Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.
With this book, Christopher Kormanyos delivers a highly practical guide to programming real-time embedded microcontroller systems in C++. It is divided into three parts plus several appendices. Part I provides a foundation for real-time C++ by covering language technologies, including object-oriented methods, template programming and optimization. Next, part II presents detailed descriptions of a variety of C++ components that are widely used in microcontroller programming. It details some of C++'s most powerful language elements, such as class types, templates and the STL, to develop components for microcontroller register access, low-level drivers, custom memory management, embedded containers, multitasking, etc. Finally, part III describes mathematical methods and generic utilities that can be employed to solve recurring problems in real-time C++. The appendices include a brief C++ language tutorial, information on the real-time C++ development environment and instructions for building GNU GCC cross-compilers and a microcontroller circuit. For this fourth edition, the most recent specification of C++20 is used throughout the text. Several sections on new C++20 functionality have been added, and various others reworked to reflect changes in the standard. Also several new example projects ranging from introductory to advanced level are included and existing ones extended, and various reader suggestions have been incorporated. Efficiency is always in focus and numerous examples are backed up with runtime measurements and size analyses that quantify the true costs of the code down to the very last byte and microsecond. The target audience of this book mainly consists of students and professionals interested in real-time C++. Readers should be familiar with C or another programming language and will benefit most if they have had some previous experience with microcontroller electronics and the performance and size issues prevalent in embedded systems programming.
This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data. |
![]() ![]() You may like...
ISIAME 2012 - Proceedings of the…
Tao Zhang, De-Sheng Xue, …
Hardcover
Edge/Fog Computing Paradigm: The…
Pethuru Raj, Kavita Saini, …
Hardcover
Resilience - The Science of Adaptation…
Zinta Zommers, Keith Alverson
Paperback
R2,228
Discovery Miles 22 280
Collapsing Gracefully: Making a Built…
Emilio Garcia, Brenda Vale, …
Hardcover
Dignaga's Investigation of the Percept…
Douglas Duckworth, Malcolm David Eckel, …
Hardcover
R3,992
Discovery Miles 39 920
|