Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studies. Cloud Computing for Data-Intensive Applications targets advanced-level students and researchers studying computer science and electrical engineering. Professionals working in cloud computing, networks, databases and more will also find this book useful as a reference.
This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studies. Cloud Computing for Data-Intensive Applications targets advanced-level students and researchers studying computer science and electrical engineering. Professionals working in cloud computing, networks, databases and more will also find this book useful as a reference.
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.
This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different scheduling contexts. The first scheme, taking the Amazon EC2 (TM) market as a case of study, investigates the optimal resource rental planning models based on linear integer programming and stochastic optimization techniques. This model is useful to explore the interaction between the cloud infrastructure provider and the cloud resource customers. The second scheme targets a free-trade resource market, studying the interactions amongst multiple rational resource traders. Leveraging an optimization framework from AI, this scheme examines the spontaneous exchange of resources among multiple resource owners. Finally, the third scheme describes an experimental market-oriented resource sharing platform inspired by eBay's transaction model. The study presented in this book sheds light on economic models and their implication to the utility-oriented scheduling problems.
This book constitutes the refereed proceedings of the 8th
International Conference on Autonomic and Trusted Computing, ATC
2011, held in Banff, Canada, September 2011.
Indoor location is one of the two most important contexts (time and location), becoming a key entry for mobile Internet. This book envisions potential indoor location applications, overviews the related state of the art technologies, and presents original patented techniques and open source prototype systems. The tutorial and sample code are provided as a good reference and starting point for readers who are interested in the technique detail.
This volume contains important and active results in the fields of Superlattices and Quantum Wells. It includes current prospects regarding scientific discoveries and future device applications. Papers are contributed by leading scientists in the world.
|
You may like...
|