0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (36)
  • R250 - R500 (168)
  • R500+ (2,572)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Systems analysis & design

VHDL for Simulation, Synthesis and Formal Proofs of Hardware (Paperback, Softcover reprint of the original 1st ed. 1992): Jean... VHDL for Simulation, Synthesis and Formal Proofs of Hardware (Paperback, Softcover reprint of the original 1st ed. 1992)
Jean Mermet
R5,132 Discovery Miles 51 320 Ships in 18 - 22 working days

The success of VHDL since it has been balloted in 1987 as an IEEE standard may look incomprehensible to the large population of hardware designers, who had never heared of Hardware Description Languages before (for at least 90% of them), as well as to the few hundreds of specialists who had been working on these languages for a long time (25 years for some of them). Until 1988, only a very small subset of designers, in a few large companies, were used to describe their designs using a proprietary HDL, or sometimes a HDL inherited from a University when some software environment happened to be developped around it, allowing usability by third parties. A number of benefits were definitely recognized to this practice, such as functional verification of a specification through simulation, first performance evaluation of a tentative design, and sometimes automatic microprogram generation or even automatic high level synthesis. As there was apparently no market for HDL's, the ECAD vendors did not care about them, start-up companies were seldom able to survive in this area, and large users of proprietary tools were spending more and more people and money just to maintain their internal system.

Logic of Computation (Paperback, Softcover reprint of the original 1st ed. 1997): Helmut Schwichtenberg Logic of Computation (Paperback, Softcover reprint of the original 1st ed. 1997)
Helmut Schwichtenberg
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

The Marktoberdorf Summer School 1995 'Logic of Computation' was the 16th in a series of Advanced Study Institutes under the sponsorship of the NATO Scientific Affairs Division held in Marktoberdorf. Its scientific goal was to survey recent progress on the impact of logical methods in software development. The courses dealt with many different aspects of this interplay, where major progress has been made. Of particular importance were the following. * The proofs-as-programs paradigm, which makes it possible to extract verified programs directly from proofs. Here a higher order logic or type theoretic setup of the underlying language has developed into a standard. * Extensions of logic programming, e.g. by allowing more general formulas and/or higher order languages. * Proof theoretic methods, which provide tools to deal with questions of feasibility of computations and also to develop a general mathematical understanding of complexity questions. * Rewrite systems and unification, again in a higher order context. Closely related is the now well-established Grabner basis theory, which recently has found interesting applications. * Category theoretic and more generally algebraic methods and techniques to analyze the semantics of programming languages. All these issues were covered by a team of leading researchers. Their courses were grouped under the following headings.

Parallel Language and Compiler Research in Japan (Paperback, Softcover reprint of the original 1st ed. 1995): Lubomir Bic,... Parallel Language and Compiler Research in Japan (Paperback, Softcover reprint of the original 1st ed. 1995)
Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato
R5,208 Discovery Miles 52 080 Ships in 18 - 22 working days

Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.

Passive and Active Measurement - 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013, Proceedings... Passive and Active Measurement - 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013, Proceedings (Paperback, 2013 ed.)
Matthew Roughan, Chang Rocky
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Passive and Active Measurement, PAM 2013, held in Hong Kong, China, in March 2013. The 24 revised full papers presented were carefully reviewed and selected from 74 submissions. The papers have been organized in the following topical sections: measurement design, experience and analysis; Internet wireless and mobility; performance measurement; protocol and application behavior; characterization of network usage; and network security and privacy. In addition, 9 poster abstracts have been included.

Computer Systems and Software Engineering - State-of-the-art (Paperback, Softcover reprint of the original 1st ed. 1992):... Computer Systems and Software Engineering - State-of-the-art (Paperback, Softcover reprint of the original 1st ed. 1992)
Patrick de Wilde, Joos P.L. Vandewalle
R4,055 Discovery Miles 40 550 Ships in 18 - 22 working days

Computer Systems and Software Engineering is a compilation of sixteen state-of-the-art lectures and keynote speeches given at the COMPEURO '92 conference. The contributions are from leading researchers, each of whom gives a new insight into subjects ranging from hardware design through parallelism to computer applications. The pragmatic flavour of the contributions makes the book a valuable asset for both researchers and designers alike. The book covers the following subjects: Hardware Design: memory technology, logic design, algorithms and architecture; Parallel Processing: programming, cellular neural networks and load balancing; Software Engineering: machine learning, logic programming and program correctness; Visualization: the graphical computer interface.

Predictably Dependable Computing Systems (Paperback, Softcover reprint of the original 1st ed. 1995): Brian Randell, Jean... Predictably Dependable Computing Systems (Paperback, Softcover reprint of the original 1st ed. 1995)
Brian Randell, Jean Claude Laprie, Hermann Kopetz, Bev Littlewood
R2,736 Discovery Miles 27 360 Ships in 18 - 22 working days

The first ESPRIT Basic Research Project on Predictably Dependable Computing Systems (No. 3092, PDCS) commenced in May 1989, and ran until March 1992. The institutions and principal investigators that were involved in PDCS were: City University, London, UK (Bev Littlewood), lEI del CNR, Pisa, Italy (Lorenzo Strigini), Universitiit Karlsruhe, Germany (Tom Beth), LAAS-CNRS, Toulouse, France (Jean-Claude Laprie), University of Newcastle upon Tyne, UK (Brian Randell), LRI-CNRS/Universite Paris-Sud, France (Marie-Claude Gaudel), Technische Universitiit Wien, Austria (Hermann Kopetz), and University of York, UK (John McDermid). The work continued after March 1992, and a three-year successor project (No. 6362, PDCS2) officially started in August 1992, with a slightly changed membership: Chalmers University of Technology, Goteborg, Sweden (Erland Jonsson), City University, London, UK (Bev Littlewood), CNR, Pisa, Italy (Lorenzo Strigini), LAAS-CNRS, Toulouse, France (Jean-Claude Laprie), Universite Catholique de Louvain, Belgium (Pierre-Jacques Courtois), University of Newcastle upon Tyne, UK (Brian Randell), LRI-CNRS/Universite Paris-Sud, France (Marie-Claude Gaudel), Technische Universitiit Wien, Austria (Hermann Kopetz), and University of York, UK (John McDermid). The summary objective of both projects has been "to contribute to making the process of designing and constructing dependable computing systems much more predictable and cost-effective." In the case of PDCS2, the concentration has been on the problems of producing dependable distributed real-time systems and especially those where the dependability requirements centre on issues of safety and/or security.

Model Driven Engineering Languages and Systems - 15th International Conference, MODELS 2012, Innsbruck, Austria, September 30... Model Driven Engineering Languages and Systems - 15th International Conference, MODELS 2012, Innsbruck, Austria, September 30 -- October 5, 2012, Proceedings (Paperback, 2012 ed.)
Robert B. France, Jurgen Kazmeier, Ruth Breu, Colin Atkinson
R1,556 Discovery Miles 15 560 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Model Driven Engineering Languages and Systems, MODELS 2012, held in Innsbruck, Austria, in September/October 2012. The 50 papers presented in this volume were carefully reviewed and selected from a total of 181 submissions. They are organized in topical sections named: metamodels and domain specific modeling; models at runtime; model management; modeling methods and tools, consistency analysis, software product lines; foundations of modeling; static analysis techniques; model testing and simulation; model transformation; model matching, tracing and synchronization; modeling practices and experience; and model analysis.

Euro-Par 2012: Parallel Processing Workshops - BDMC, CGWS, HeteroPar, HiBB, OMHI, Paraphrase, PROPER, Resilience, UCHPC, VHPC,... Euro-Par 2012: Parallel Processing Workshops - BDMC, CGWS, HeteroPar, HiBB, OMHI, Paraphrase, PROPER, Resilience, UCHPC, VHPC, Rhodes Island, Greece, August 27-31, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Ioannis Caragiannis, Michael Alexander, Rosa Maria Badia, Mario Cannataro, Alexandru Costan, …
R1,494 Discovery Miles 14 940 Ships in 18 - 22 working days

This book constitutes thoroughly refereed post-conference proceedings of the workshops of the 18th International Conference on Parallel Computing, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The papers of these 10 workshops BDMC, CGWS, HeteroPar, HiBB, OMHI, Paraphrase, PROPER, UCHPC, VHPC focus on promotion and advancement of all aspects of parallel and distributed computing.

Software Configuration Management Using Vesta (Paperback, 2006): Clark Allan Heydon, Roy Levin, Timothy P. Mann, Yuan Yu Software Configuration Management Using Vesta (Paperback, 2006)
Clark Allan Heydon, Roy Levin, Timothy P. Mann, Yuan Yu
R2,649 Discovery Miles 26 490 Ships in 18 - 22 working days

Helps in the development of large software projects.

Uses a well-known open-source software prototype system (Vesta developed at Digital and Compaq Systems Research Lab).

Evaluating AAL Systems Through Competitive Benchmarking - Indoor Localization and Tracking - International Competition, EvAAL... Evaluating AAL Systems Through Competitive Benchmarking - Indoor Localization and Tracking - International Competition, EvAAL 2011, Competition in Valencia, Spain, July 25-29, 2011, and Final Workshop in Lecce ,Italy, September 26, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Stefano Chessa, Stefan Knauth
R1,361 Discovery Miles 13 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living (AAL) systems and services, EvAAL 2011, which was organized in two major events, the Competition in Valencia, Spain, in July 2011, and the Final workshop in Lecce, Italy, in September 2011. The papers included in this book describe the organization and technical aspects of the competition, and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition.

Implementing Health Care Information Systems (Paperback, Softcover reprint of the original 1st ed. 1989): Helmuth F Orthner,... Implementing Health Care Information Systems (Paperback, Softcover reprint of the original 1st ed. 1989)
Helmuth F Orthner, Bruce I. Blum
R2,697 Discovery Miles 26 970 Ships in 18 - 22 working days

This series in Computers and Medicine had its origins when I met Jerry Stone of Springer-Verlag at a SCAMC meeting in 1982. We determined that there was a need for good collections of papers that would help disseminate the results of research and application in this field. I had already decided to do what is now Information Systems for Patient Care, and Jerry contributed the idea of making it part of a series. In 1984 the first book was published, and-thanks to Jerry's efforts - Computers and Medicine was underway. Since that time, there have been many changes. Sadly, Jerry died at a very early age and cannot share in the success of the series that he helped found. On the bright side, however, many of the early goals of the series have been met. As the result of equipment improvements and the consequent lowering of costs, com puters are being used in a growing number of medical applications, and the health care community is very computer literate. Thus, the focus of concern has turned from learning about the technology to understanding how that technology can be exploited in a medical environment."

Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.): Xinming Ou, Anoop Singhal Quantitative Security Risk Assessment of Enterprise Networks (Paperback, 2011 ed.)
Xinming Ou, Anoop Singhal
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "are we more secure than yesterday" or "how does the security of one network configuration compare with another one". In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System (CVSS). Our techniques analyze all attack paths through a network, for an attacker to reach certain goal(s).

Computer Performance Engineering - 9th European Workshop, EPEW 2012, Munich, Germany, July 30, 2012, and 28th UK Workshop,... Computer Performance Engineering - 9th European Workshop, EPEW 2012, Munich, Germany, July 30, 2012, and 28th UK Workshop, UKPEW 2012, Edinburgh, UK, July 2, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Mirco Tribastone, Stephen Gilmore
R2,443 Discovery Miles 24 430 Ships in 18 - 22 working days

This book constitutes the refereed post-proceedings of the 9th European Performance Engineering Workshop, EPEW 2012, held in Munich, Germany, and the 28th UK Performance Engineering Workshop, UKPEW 2012, held in Edinburgh, UK, in July 2012. The 15 regular papers and one poster presentation paper presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics from classical performance modeling areas such as wireless network protocols and parallel execution of scientific codes to hot topics such as energy-aware computing to unexpected ventures into ranking professional tennis players. In addition to new case studies, the papers also present new techniques for dealing with the modeling challenges brought about by the increasing complexity and scale of systems today.

Guide to Applying Human Factors Methods - Human Error and Accident Management in Safety-Critical Systems (Paperback, Softcover... Guide to Applying Human Factors Methods - Human Error and Accident Management in Safety-Critical Systems (Paperback, Softcover reprint of the original 1st ed. 2004)
Carlo Cacciabue
R1,538 Discovery Miles 15 380 Ships in 18 - 22 working days

Human error plays a significant role in many accidents involving safety-critical systems, and it is now a standard requirement in both the US and Europe for Human Factors (HF) to be taken into account in system design and safety assessment. This book will be an essential guide for anyone who uses HF in their everyday work, providing them with consistent and ready-to-use procedures and methods that can be applied to real-life problems. The first part of the book looks at the theoretical framework, methods and techniques that the engineer or safety analyst needs to use when working on a HF-related project. The second part presents four case studies that show the reader how the above framework and guidelines work in practice. The case studies are based on real-life projects carried out by the author for a major European railway system, and in collaboration with international companies such as the International Civil Aviation Organisation, Volvo, Daimler-Chrysler and FIAT.

Current Trends in Hardware Verification and Automated Theorem Proving (Paperback, Softcover reprint of the original 1st ed.... Current Trends in Hardware Verification and Automated Theorem Proving (Paperback, Softcover reprint of the original 1st ed. 1989)
Graham Birtwistle, P.A. Subrahmanyam
R2,708 Discovery Miles 27 080 Ships in 18 - 22 working days

This report describes the partially completed correctness proof of the Viper 'block model'. Viper 7,8,9,11,23] is a microprocessor designed by W. J. Cullyer, C. Pygott and J. Kershaw at the Royal Signals and Radar Establishment in Malvern, England, (henceforth 'RSRE') for use in safety-critical applications such as civil aviation and nuclear power plant control. It is currently finding uses in areas such as the de ployment of weapons from tactical aircraft. To support safety-critical applications, Viper has a particulary simple design about which it is relatively easy to reason using current techniques and models. The designers, who deserve much credit for the promotion of formal methods, intended from the start that Viper be formally verified. Their idea was to model Viper in a sequence of decreasingly abstract levels, each of which concentrated on some aspect ofthe design, such as the flow ofcontrol, the processingofinstructions, and so on. That is, each model would be a specification of the next (less abstract) model, and an implementation of the previous model (if any). The verification effort would then be simplified by being structured according to the sequence of abstraction levels. These models (or levels) of description were characterized by the design team. The first two levels, and part of the third, were written by them in a logical language amenable to reasoning and proof."

Video Processing in the Cloud (Paperback, 2011 ed.): Rafael Silva Pereira, Karin K. Breitman Video Processing in the Cloud (Paperback, 2011 ed.)
Rafael Silva Pereira, Karin K. Breitman
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

As computer systems evolve, the volume of data to be processed increases significantly, either as a consequence of the expanding amount of available information, or due to the possibility of performing highly complex operations that were not feasible in the past. Nevertheless, tasks that depend on the manipulation of large amounts of information are still performed at large computational cost, i.e., either the processing time will be large, or they will require intensive use of computer resources. In this scenario, the efficient use of available computational resources is paramount, and creates a demand for systems that can optimize the use of resources in relation to the amount of data to be processed. This problem becomes increasingly critical when the volume of information to be processed is variable, i.e., there is a seasonal variation of demand. Such demand variations are caused by a variety of factors, such as an unanticipated burst of client requests, a time-critical simulation, or high volumes of simultaneous video uploads, e.g. as a consequence of a public contest. In these cases, there are moments when the demand is very low (resources are almost idle) while, conversely, at other moments, the processing demand exceeds the resources capacity. Moreover, from an economical perspective, seasonal demands do not justify a massive investment in infrastructure, just to provide enough computing power for peak situations. In this light, the ability to build adaptive systems, capable of using on demand resources provided by Cloud Computing infrastructures is very attractive.

Network Computing and Information Security - Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012,... Network Computing and Information Security - Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012, Proceedings (Paperback, 2012 ed.)
Jingsheng Lei, Fu Lee Wang, Mo Li, Yuan Luo
R2,803 Discovery Miles 28 030 Ships in 18 - 22 working days

This book constitutes the proceedings of the Second International Conference on Network Computing and Information Security, NCIS 2012, held in Shanghai, China, in December 2012. The 104 revised papers presented in this volume were carefully reviewed and selected from 517 submissions. They are organized in topical sections named: applications of cryptography; authentication and non-repudiation; cloud computing; communication and information systems; design and analysis of cryptographic algorithms; information hiding and watermarking; intelligent networked systems; multimedia computing and intelligence; network and wireless network security; network communication; parallel and distributed systems; security modeling and architectures; sensor network; signal and information processing; virtualization techniques and applications; and wireless network.

Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network... Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings (Paperback, 2012 ed.)
Igor Kotenko, Victor Skormin
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

A System Administrator's Guide to Sun Workstations (Paperback, Softcover reprint of the original 1st ed. 1991): George... A System Administrator's Guide to Sun Workstations (Paperback, Softcover reprint of the original 1st ed. 1991)
George Becker, Kathy Slattery
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

This Guide to Sun Administration is areference manual written by Sun administrators for Sun administrators. The book is not in tended to be a complete guide to UNIX Systems Administration; instead it will concentrate on the special issues that are particular to the Sun environment. It will take you through the basic steps necessary to install and maintain a network of Sun computers. Along the way, helpful ideas will be given concerning NFS, YP, backup and restore procedures, as well as many useful installation tips that can make a system administrator's job less painful. Spe cifically, SunGS 4.0 through 4.0.3 will be studied; however, many ofthe ideas and concepts presented are generic enough to be used on any version of SunGS. This book is not intended to be basic introduction to SunGS. It is assumed thatthe reader will have at least a year ofexperience supporting UNIX. BookOverview The firstchaptergives adescription ofthe system types thatwill be discussed throughout the book. An understanding of all of the system types is needed to comprehend the rest ofthe book. Chapter 2 provides the information necessary to install a workstation. The format utility and the steps involved in the suninstall process are covered in detail. Ideas and concepts about partitioning are included in this chapter. YP is the topic of the third chapter. A specific description of each YPmap and each YPcommand ispresented, along with some tips about ways to best utilize this package in your environment.

Advanced Methods, Techniques, and Applications in Modeling and Simulation - Asia Simulation Conference 2011, Seoul, Korea,... Advanced Methods, Techniques, and Applications in Modeling and Simulation - Asia Simulation Conference 2011, Seoul, Korea, November 2011, Proceedings (Paperback, 2012 ed.)
Jong Hyun Kim, Kangsun Lee, Satoshi Tanaka, Soo-Hyun Park
R2,720 Discovery Miles 27 200 Ships in 18 - 22 working days

This book is a compilation of research accomplishments in the fields of modeling, simulation, and their applications, as presented at AsiaSim 2011 (Asia Simulation Conference 2011). The conference, held in Seoul, Korea, November 16-18, was organized by ASIASIM (Federation of Asian Simulation Societies), KSS (Korea Society for Simulation), CASS (Chinese Association for System Simulation), and JSST (Japan Society for Simulation Technology). AsiaSim 2011 provided a forum for scientists, academicians, and professionals from the Asia-Pacific region and other parts of the world to share their latest exciting research findings in modeling and simulation methodologies, techniques, and their tools and applications in military, communication network, industry, and general engineering problems.

Software for Parallel Computation (Paperback, Softcover reprint of the original 1st ed. 1993): Janusz S. Kowalik, Lucio... Software for Parallel Computation (Paperback, Softcover reprint of the original 1st ed. 1993)
Janusz S. Kowalik, Lucio Grandinetti
R2,689 Discovery Miles 26 890 Ships in 18 - 22 working days

This volume contains papers presented at the NATO sponsored Advanced Research Workshop on "Software for Parallel Computation" held at the University of Calabria, Cosenza, Italy, from June 22 to June 26, 1992. The purpose of the workshop was to evaluate the current state-of-the-art of the software for parallel computation, identify the main factors inhibiting practical applications of parallel computers and suggest possible remedies. In particular it focused on parallel software, programming tools, and practical experience of using parallel computers for solving demanding problems. Critical issues relative to the practical use of parallel computing included: portability, reusability and debugging, parallelization of sequential programs, construction of parallel algorithms, and performance of parallel programs and systems. In addition to NATO, the principal sponsor, the following organizations provided a generous support for the workshop: CERFACS, France, C.I.R.A., Italy, C.N.R., Italy, University of Calabria, Italy, ALENIA, Italy, The Boeing Company, U.S.A., CISE, Italy, ENEL - D.S.R., Italy, Alliant Computer Systems, Bull RN Sud, Italy, Convex Computer, Digital Equipment Corporation, Rewlett Packard, Meiko Scientific, U.K., PARSYTEC Computer, Germany, TELMAT Informatique, France, Thinking Machines Corporation.

Essence of Systems Analysis and Design - A Workbook Approach (Hardcover, 1st ed. 2017): Priti Srinivas Sajja Essence of Systems Analysis and Design - A Workbook Approach (Hardcover, 1st ed. 2017)
Priti Srinivas Sajja
R1,774 Discovery Miles 17 740 Ships in 9 - 17 working days

The main objective is to provide quick and essential knowledge for the subject with the help of summary and solved questions /case studies without going into detailed discussion. This book will be much helpful for the students as a supplementary text/workbook; and to the non-computer professionals, who deal with the systems analysis and design as part of their business. Such problem solving approach will be able to provide practical knowledge of the subject and similar learning output, without going into lengthy discussions. Though the book is conceived as supplementary text/workbook; the topics are selected and arranged in such a way that it can provide complete and sufficient knowledge of the subject.

Pervasive Computing - Innovations in Intelligent Multimedia and Applications (Paperback, 2010 ed.): Aboul Ella Hassanien, Jemal... Pervasive Computing - Innovations in Intelligent Multimedia and Applications (Paperback, 2010 ed.)
Aboul Ella Hassanien, Jemal H. Abawajy, Ajith Abraham, Hani Hagras
R4,062 Discovery Miles 40 620 Ships in 18 - 22 working days

The main objective of pervasive computing systems is to create environments where computers become invisible by being seamlessly integrated and connected into our everyday environment, where such embedded computers can then provide inf- mation and exercise intelligent control when needed, but without being obtrusive. Pervasive computing and intelligent multimedia technologies are becoming incre- ingly important to the modern way of living. However, many of their potential applications have not yet been fully realized. Intelligent multimedia allows dynamic selection, composition and presentation of the most appropriate multimedia content based on user preferences. A variety of applications of pervasive computing and - telligent multimedia are being developed for all walks of personal and business life. Pervasive computing (often synonymously called ubiquitous computing, palpable computing or ambient intelligence) is an emerging ?eld of research that brings in revolutionary paradigms for computing models in the 21st century. Pervasive c- puting is the trend towards increasingly ubiquitous connected computing devices in the environment, a trend being brought about by a convergence of advanced el- tronic - and particularly, wireless - technologies and the Internet. Recent advances in pervasive computers, networks, telecommunications and information technology, along with the proliferation of multimedia mobile devices - such as laptops, iPods, personal digital assistants (PDAs) and cellular telephones - have further stimulated the development of intelligent pervasive multimedia applications. These key te- nologiesarecreatingamultimediarevolutionthatwillhavesigni?cantimpactacross a wide spectrum of consumer, business, healthcare and governmental domains.

Guide to Enterprise IT Architecture (Paperback, Softcover reprint of the original 1st ed. 2003): Col Perks, Tony Beveridge Guide to Enterprise IT Architecture (Paperback, Softcover reprint of the original 1st ed. 2003)
Col Perks, Tony Beveridge
R2,960 Discovery Miles 29 600 Ships in 18 - 22 working days

An up-to-date and comprehensive overview of information and database systems design and implementation. The book provides an accessible presentation and explanation of technical architecture for systems complying with TOGAF standards, the accepted international framework. Covering nearly the full spectrum of architectural concern, the authors also illustrate and concretize the notion of traceability from business goals, strategy through to technical architecture, providing the reader with a holistic and commanding view. The work has two mutually supportive foci. First, information technology technical architecture, the in-depth, illustrative and contemporary treatment of which comprises the core and majority of the book; and secondly, a strategic and business context.

OpenMP in a Heterogeneous World - 8th International Workshop on OpenMP, IWOMP 2012, Rome, Italy, June 11-13, 2012. Proceedings... OpenMP in a Heterogeneous World - 8th International Workshop on OpenMP, IWOMP 2012, Rome, Italy, June 11-13, 2012. Proceedings (Paperback, 2012)
Barbara Chapman, Federico Massaioli, Matthias S. Muller, Marco Rorro
R1,406 Discovery Miles 14 060 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on OpenMP, held in in Rome, Italy, in June 2012. The 18 technical full papers presented together with 7 posters were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on proposed extensions to OpenMP, runtime environments, optimization and accelerators, task parallelism, validations and benchmarks

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer Systems and Software…
Information Reso Management Association Hardcover R8,935 Discovery Miles 89 350
Data Science - Tips and Tricks to Learn…
William Vance Hardcover R588 R542 Discovery Miles 5 420
Security-Aware Systems Applications and…
Khaled M Khan Hardcover R4,967 Discovery Miles 49 670
Developing Service-Oriented Applications…
Chirag Patel Hardcover R5,064 Discovery Miles 50 640
Real-Time Systems Development
Rob Williams Paperback R1,319 Discovery Miles 13 190
Systems Analysis And Design
Scott Tilley Hardcover R1,302 R1,213 Discovery Miles 12 130
Building Intelligent Agents - An…
Gheorghe Tecuci Paperback R2,387 Discovery Miles 23 870
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Temporal Self-organization for Neural…
Neil Euliano Hardcover R2,084 Discovery Miles 20 840
Cases on Lean Thinking Applications in…
Eduardo Guilherme Satolo, Robisom Damasceno Calado Hardcover R5,991 Discovery Miles 59 910

 

Partners