|
Showing 1 - 21 of
21 matches in All Departments
This book provides an overview of and essential insights on
invasive computing. Pursuing a comprehensive approach, it addresses
proper concepts, invasive language constructs, and the principles
of invasive hardware. The main focus is on the important topic of
how to map task-parallel applications to future multi-core
architectures including 1,000 or more processor units. A special
focus today is the question of how applications can be mapped onto
such architectures while not only taking into account functional
correctness, but also non-functional execution properties such as
execution times and security properties. The book provides
extensive experimental evaluations, investigating the benefits of
applying invasive computing and hybrid application mapping to give
guarantees on non-functional properties such as timing, energy, and
security. The techniques in this book are presented in a
step-by-step manner, supported by examples and figures. All
proposed ideas for providing guarantees on performance, energy
consumption, and security are enabled by using the concept of
invasive computing and the exclusive usage of resources.
Focusing on material and social forms of infrastructure, this
edited collection draws on rich empirical details from cities
across the global North and South. The book asks the reader to
think through the different ways in which infrastructure comes to
be present in cities and its co-constitutive relationships with
urban inhabitants and wider processes of urbanisation. Considering
the climate emergency, economic transformation, public health
crises, and racialized inequality, the book argues that paying
attention to infrastructures' past, present and future allows us to
understand and respond to the current urban condition.
This book provides an overview of and essential insights on
invasive computing. Pursuing a comprehensive approach, it addresses
proper concepts, invasive language constructs, and the principles
of invasive hardware. The main focus is on the important topic of
how to map task-parallel applications to future multi-core
architectures including 1,000 or more processor units. A special
focus today is the question of how applications can be mapped onto
such architectures while not only taking into account functional
correctness, but also non-functional execution properties such as
execution times and security properties. The book provides
extensive experimental evaluations, investigating the benefits of
applying invasive computing and hybrid application mapping to give
guarantees on non-functional properties such as timing, energy, and
security. The techniques in this book are presented in a
step-by-step manner, supported by examples and figures. All
proposed ideas for providing guarantees on performance, energy
consumption, and security are enabled by using the concept of
invasive computing and the exclusive usage of resources.
Lord Drustan Chase is being haunted by nightmares of his lands
dying. The demons in his nightmares will prevail unless he sends
his seventeen year old daughter Marissa out on a journey. She is to
find the one whom she was betrothed to many years ago and return
back home to Aberdeen with him.
Diplomarbeit aus dem Jahr 2009 im Fachbereich Informatik -
Wirtschaftsinformatik, Note: 1,0, FOM Essen, Hochschule fur
Oekonomie & Management gemeinnutzige GmbH, Hochschulleitung
Essen fruher Fachhochschule, Sprache: Deutsch, Abstract: This
diploma thesis deals with high availibility specially on open
source software. A short brief explained why using open source
software. Availibilty and other operating figures will be defined.
Measureplans to solve this problem were made by German Bundesamt
fuer Sicherheit in der Informationstechnik and the IT
infrastructure library. DRBD and iSCSI were used to realize a small
prized storage attached network. Different kind of database
clusters using MySQL. Heartbeat and Linux Virtual Server are needed
for high availibility and loadbalancing. Some examples shows how to
reach high availibility on low costs with open source software.
Studienarbeit aus dem Jahr 2008 im Fachbereich Informatik -
Internet, neue Technologien, Note: 1,0, FOM Essen, Hochschule fur
Oekonomie & Management gemeinnutzige GmbH, Hochschulleitung
Essen fruher Fachhochschule, Sprache: Deutsch, Abstract: Diese
Arbeit befasst sich mit dem neuen Reisepass mit integrierten
RFID-Chip zur drahtlosen Kommunikation. Nach Grundlagen zur
Biometrie werden die Besonderheiten der RFID-Kodierungen
aufgezeigt. Anschliessend werden diese Besonderheiten aus
datenschutzrechtlicher Sicht betrachtet. Abschliessend wird die
Einfuhrung des neuen Reisepasses kritisch bewertet.
Studienarbeit aus dem Jahr 2008 im Fachbereich Informatik -
Allgemeines, Note: 1,0, FOM Essen, Hochschule fur Oekonomie &
Management gemeinnutzige GmbH, Hochschulleitung Essen fruher
Fachhochschule, Sprache: Deutsch, Abstract: In dieser Arbeit wird
Nagios als Network Monitoring Service eingesetzt. Es werden neben
grundsatzlichen Themen der Netzwerkuberwachung Besonderheiten einer
Notruf- und Serviceleitstelle dargestellt. Die Arbeit orientiert
sich an der Praxis und wird erganzt durch eine
Beispielkonfiguration. Zum Abschluss wird ein Ausblick fur weitere
Konfigurationsmoglichkeiten, wie Hochverfugbarkeit oder grafischen
Visualisierung, gegeben
|
You may like...
Not available
Wonka
Timothee Chalamet
Blu-ray disc
R250
Discovery Miles 2 500
|