Computer architecture and logic design Books
O'Reilly Media ProductionReady Microservices
Book SynopsisIn this practical book, author Susan Fowler presents a set of microservice standards in depth, drawing from her experience standardizing over a thousand microservices at Uber. You'll learn how to design microservices that are stable, reliable, scalable, fault tolerant, performant, monitored, documented, and prepared for any catastrophe.
£25.59
O'Reilly Media Knative Cookbook
Book SynopsisWith more than 60 practical recipes, this cookbook helps you solve these issues with Knativethe first serverless platform natively designed for Kubernetes. Each recipe contains detailed examples and exercises, along with a discussion of how and why it works.
£33.74
O'Reilly Media Migrating to AWS A Managers Guide
Book SynopsisBring agility, cost savings, and a competitive edge to your business by migrating your IT infrastructure to AWS. With this practical book, executive and senior leadership and engineering and IT managers will examine the advantages, disadvantages, and common pitfalls when moving your company's operations to the cloud.
£39.74
Taylor & Francis Inc Analog Electronics Applications
Book SynopsisThis comprehensive text discusses the fundamentals of analog electronics applications, design, and analysis. Unlike the physics approach in other analog electronics books, this text focuses on an engineering approach, from the main components of an analog circuit to general analog networks. Concentrating on development of standard formulae for conventional analog systems, the book is filled with practical examples and detailed explanations of procedures to analyze analog circuits. The book covers amplifiers, filters, and op-amps as well as general applications of analog design. Trade Review"Although, there are several textbooks available on analog electronics, this is one of the few books which provides a clear, concise explanations of complex concepts of analog circuits in a simple way through practical examples. This book covers comprehensively the main aspects of analog components, circuits and applications." — Ali Ahmadinia, California State University San Marcos, USA"It is an extremely comprehensive book covering all aspects of analogue electronics at the undergraduate level. It also includes review material on the prerequisites like circuit theory. Important topics which are often covered briefly or omitted in other books, like feedback, transistor models and active filters, to name a few, are fully developed in this book." — Carlos Gamio, Glasgow Caledonian University, Scotland"The chapters of the textbook...represent a good basis of study for junior undergraduate students of electrical and electronic engineering. The content is, in general, accurate and relevant." — Barry Beggs, Glasgow Caledonian University, Scotland"Although, there are several textbooks available on analog electronics, this is one of the few books which provides a clear, concise explanations of complex concepts of analog circuits in a simple way through practical examples. This book covers comprehensively the main aspects of analog components, circuits and applications." — Ali Ahmadinia, California State University San Marcos, USA"It is an extremely comprehensive book covering all aspects of analogue electronics at the undergraduate level. It also includes review material on the prerequisites like circuit theory. Important topics which are often covered briefly or omitted in other books, like feedback, transistor models and active filters, to name a few, are fully developed in this book." — Carlos Gamio, Glasgow Caledonian University, Scotland"The chapters of the textbook...represent a good basis of study for junior undergraduate students of electrical and electronic engineering. The content is, in general, accurate and relevant." — Barry Beggs, Glasgow Caledonian University, ScotlandTable of ContentsIntroduction to Analog Electronics. Electric Circuits. Bipolar Junction Transistor BJT. Field Effect Transistors FET. Bipolar Junction Transistor Biasing. Modelling Transistors. Small Signal Analysis of an Amplifier Under Different Models. Amplifiers Frequency Response. The Common Collector Amplifier/Emitter Follower. The Common Base Amplifier. Common emitter Amplifier in Cascade. Field Effect Transistor Biasing. Field Effect Transistor as Amplifiers. Transfer Function and Bode Diagrams. Feedback in amplifiers. Differential Amplifiers. Operational Amplifiers Op-Amps. Filters. Applications of Analogue Electronics. Future Trend of Analog Electronics. Computer Aided Simulation of Practical Assignments.
£171.00
Taylor & Francis Inc Practical Cloud Security
Book SynopsisMelvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies Provides insight into the interaction and croTable of Contents Practical Cloud Security
£71.24
Taylor & Francis Inc Mobile Ad Hoc Networks
Book SynopsisIn recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI techniques provide a natural solution through a distributed approach for the adaptive routing for MANETs. In SI techniques, the captivating features of insects or mammals are correlated with the real world problems to find solutions. Recently, several applications of bio-inspired and nature-inspired algorithms in telecommunications and computer networks have achieved remarkable success. The main aims/objectives of this book, Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols, are twofold; firstly it clearly distinguishes between principles of traditional routing protocols and SI based routing protocols, while explaining in detail the analogy between MANETs and SITable of ContentsIntroduction. Swarm Intelligence Techniques. SI Solutions to Routing in MANETs. SI Solutions to QoS in MANETs. SI Solutions to Security Issues in MANETs. Conclusions and Future Directions. Appendix. References.
£147.25
Taylor & Francis Inc Advances in Smart Cities
Book SynopsisThis is an edited book based on the selected submissions made to the conference titled International Conference in Smart Cities. The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across all domains, typically supported by ICT and open data.Table of ContentsAdoption and Acceptance of Mandatory Electronic Public Services by Citizens in the Developing World. Self-Sustainable Integrated Township. Smart People for Smart Cities. How Smart Cities influence Governance? Role of Manufacturing Sector to Develop Smart Economy. Concept of Smart Village in India. Smart City. Smart City Technologies. A Cloud-Based Mobile Application for Cashless Payments. Financial Viability of Energy Conservation using Natural Light. Information Risk for Digital Services. Mobile Commerce Research for Individual, Business and Society. The Shift Toward a Sustainable Urban Mobility through Decision Support Systems.
£133.00
Artech House Publishers Enterprise Architecture for Integration: Rapid Delivery Methods and Technologies
Book SynopsisWith the fast pace of change in today's business environment, the need to transform organizations into agile enterprises that can respond quickly to change has never been greater. Methods and computer technologies are needed to enable rapid business and system change, and this practical book shows professionals how to achieve this agility. The solution lies in Enterprise Integration (both business and technology integration). For business integration, the book explains how to use enterprise architecture methods to integrate data, processes, locations, people, events and business plans throughout an organization.
£113.00
Universal Publishers The 8051/8052 Microcontroller: Architecture, Assembly Language, and Hardware Interfacing
£45.44
Nova Science Publishers Inc Fuzzy Logic: Theory, Programming & Applications
Book SynopsisFuzzy logic is a form of multi-valued logic derived from fuzzy set theory to deal with reasoning that is approximate rather than precise. Just as in fuzzy set theory the set membership values can range (inclusively) between 0 and 1, in fuzzy logic the degree of truth of a statement can range between 0 and 1 and is not constrained to the two truth values {true, false} as in classic predicate logic. And when linguistic variables are used, these degrees may be managed by specific functions, as discussed below. Some Current areas of application include: Automobile and other vehicle subsystems, such as automatic transmissions, ABS and cruise control (e.g. Tokyo monorail) Air conditioners, The Massive engine used in the Lord of the Rings films, which helped huge scale armies create random, yet orderly movements , Cameras, Digital image processing, such as edge detection, Rice cookers, Dishwashers, Elevators, Washing machines and other home appliances, Video game artificial intelligence, Language filters on message boards and chat rooms for filtering out offensive text, Pattern recognition in Remote Sensing, This book brings together the latest research in the field.
£176.24
Purdue University Press Practical Digital Design: An Introduction to VHDL
Book SynopsisThe VHSIC Hardware Description Language (VHDL) is one of the two most popular languages used to design digital logic circuits. This book provides a comprehensive introduction to the syntax and the most commonly used features of VHDL. It also presents a formal digital design process and the best-case design practices that have been developed over more than twenty-five years of VHDL design experience by the author in military ground and satellite communication systems. Unlike other books on this subject, this real-world professional experience captures not only the what of VHDL, but also the how. Throughout the book, recommended methods for performing digital design are presented along with the common pitfalls and the techniques used to successfully avoid them. Written for students learning VHDL for the first time as well as professional development material for experienced engineers, this book's contents minimize design time while maximizing the probability of first-time design success.Table of Contents PREFACE ACKNOWLEDGMENTS ABOUT THE AUTHOR CHAPTER 1 INTRODUCTION CHAPTER 2 SIGNALS, TIME, AND THE SIMULATION CYCLE CHAPTER 3 THE VHDL DESIGN ENVIRONMENT CHAPTER 4 DECLARATIONS CHAPTER 5 LIBRARIES AND DESIGN UNITS CHAPTER 6 CONCURRENT STATEMENTS CHAPTER 7 SEQUENTIAL STATEMENTS CHAPTER 8 THE PROCESS STATEMENT CHAPTER 9 MODELING CASE STUDIES CHAPTER 10 SUBPROGRAMS CHAPTER 11 SIMULATION AND TEST BENCHES CHAPTER 12 TEST BENCH DEVELOPMENT CHAPTER 13 TEST BENCH CASE STUDIES CHAPTER 14 LOGIC SYNTHESIS CHAPTER 15 ASIC AND FPGA TECHNOLOGY CHAPTER 16 SYNTHESIS CODE EXAMPLES CHAPTER 17 SPECIALIZED CODE EXAMPLES CHAPTER 18 STATE MACHINES CHAPTER 19 FUNCTIONAL DECOMPOSITION CHAPTER 20 FILTER DESIGN EXAMPLE CHAPTER 21 DESIGN REUSE APPENDIX A CODING STYLE GUIDELINES APPENDIX B FUNCTIONAL DESCRIPTION EXAMPLE APPENDIX C VHDL RESERVED WORDS STATEMENT INDEX SUBJECT INDEX
£69.30
Manning Publications Infrastructure as Code, Patterns and Practices:
Book SynopsisEssential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to software-as-a-Service. The book is full of techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. Infrastructure as Code (IaC) replaces time-consuming manual provisioning and configuration with automation via configuration managers or provisioning tools like Hashicorp Terraform. Managing your infrastructure as code makes it easy to test changes and implement new features, scale systems without downtime or operational toil, and rapidly roll back mistakes.Trade Review“This book has a refreshing take on infrastructure as code.” Stanford S.Guillory “Loved the content, especially since the author talks about stuff we've been asking ourselves since forever but never found a clear answer!” SylvainMartel “The author provides real-world, hands-on guidance that cuts through the nuances of framework specifics and gets to the heart of great IaC as she discusses tools, techniques and sound practice.” JeremyBryan “Provides precious hints to automate the creation of structured infrastructures by coding.” Cosimo Attanasi “Kudos all around, very timely and necessary, breaking down this subject in such a clear way.” Sean Booker
£40.85
Manning Publications Street Coder
Book SynopsisSoftware development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.Trade Review“An incredible book to learn the craft of software development through a new perspective: One thatis not fuelled by religion or blind following of best practices, but one that actively challenges best practices and thus requires you to think about their prosand cons.!” Sebastian Felling “This is like having a mentor in a book who is sharing all their mistakes and notes on what they've learned in a nice little package.“ Joseph Perenia “A fun, broad, anddeep conversation with an experienced programmer about coding, packed withpractical advice.” Adail Retamal “I wish I couldread this book several years ago, thus, I could have saved a lot of time.” XuYang “Contains the pragmatism an experienced software developer has gained over the years of being at the trenches (or streets as he prefers to call it).” Orlando MéndezMorales “Great book for thenew and used, self-taught, formally educated, and otherwise curious programmers doing dirt -aka street coders.” Robert Wilk
£37.99
£32.25
SDC Publications Designing with Creo Parametric 4.0
Book SynopsisDesigning with Creo Parametric 4.0 provides the high school student, college student, or practicing engineer with a basic introduction to engineering design while learning the 3D modeling Computer-Aided Design software called Creo Parametric from PTC. The topics are presented in tutorial format with exercises at the end of each chapter to reinforce the concepts covered. It is richly illustrated with computer screen shots throughout. Above all, this text is designed to help the reader expand their creative talents and communicate their ideas through the graphics language.
£94.04
SDC Publications Engineering Graphics Essentials with AutoCAD 2019
Book SynopsisEngineering Graphics Essentials with AutoCAD 2019 Instruction gives students a basic understanding of how to create and read engineering drawings by presenting principles in a logical and easy to understand manner. It covers the main topics of engineering graphics, including tolerancing and fasteners.
£59.85
Manning Publications Podman in Action
Book SynopsisDiscover Podman, a next-generation container engine that manages containers rootlessly and provides extra layers of exceptional security unavailable in Docker and other container platforms. In Podman in Action you will learn how to: Build and run containers in rootless mode Develop and manage pods Use SystemD to oversee a container's lifecycle Work with the Podman service via Python Keep your containers confined using Podman security features Manage containerized applications on edge devices Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. It also demonstrates how, with Podman, you can easily convert containerized applications into Kubernetes-based microservices. about the technology Podman is a daemonless container engine that lets you build and run containers on all Linux distributions, Windows, and MacOS. It supports the fork exec model for running containers, which allows for better integration with a system and makes it easier to run rootless. It also boasts unique advanced features, such as the ability to create and run Pods that are similar to Kubernetes, and execute Kubernetes YAML. And if you're not ready to completely move on from Docker, Podman can run as a service and support the Docker API in a way that works with docker-compose and docker-py. about the reader For developers or system administrators experienced with Linux and the basics of Docker.
£45.99
Manning Publications Data Mesh in Action
Book SynopsisRevolutionize the way your organization approaches data with a data mesh! This new decentralized architecture outpaces monolithic lakes and warehouses and can work for a company of any size. Data Mesh in Action reveals how this ground breaking architecture looks for both small start-ups and large enterprises. You'll see a datamesh in action as you explore both an extended case study andmultiple real-world examples. As you go, you'll be expertly guidedthrough discussions around Socio-Technical Architecture and Domain-Driven Design with the goal of building a sleek data-as-a-productsystem.
£45.04
Pragmatic Bookshelf Quantum Computing: Program Next-Gen Computers for
Book SynopsisYou've heard that quantum computing is going to change the world. Now you can check it out for yourself. Learn how quantum computing works, and write programs that run on the IBM Q quantum computer, one of the world's first functioning quantum computers. Learn a simple way to apply quantum mechanics to computer programming. Create algorithms to solve intractable problems for classical computers, and discover how to explore the entire problem space at once to determine the optimal solution. Get your hands on the future of computing today. Quantum computing overhauls computer science. Problems such as designing life-saving drugs and super-large logistics problems that have been difficult or impossible for classical computers to handle can now be solved in moments. Quantum computing makes it possible to explore all possible solutions simultaneously and determine those that work, instead of iterating through each possibility sequentially. Work with quantum computers directly, instead of talking about them theoretically. Work with qubits, the fundamental elements of quantum computing. Discover what makes them different from classical bits. Model complex problems with logic gates specific to quantum computing. Learn how quantum mechanics offers ways to write programs that explore all solutions simultaneously. Create quantum circuits to solve problems that classical computers struggle with. Dive into quantum optimization and cryptography. Use the IBM Q quantum computer to both simulate quantum effects, and actually run your programs on a real quantum machine. Get a head start on the technology that will drive computer science into the future. What You Need: Access to the IBM quantum computer, via any internet connection
£35.14
Morgan & Claypool Publishers Principles of Secure Processor Architecture
Book SynopsisThis book presents the different challenges of secure processor architecture design for architects working in industry who want to add security features to their designs as well as graduate students interested in research on architecture and hardware security.It educates readers about how the different challenges have been solved in the past and what are the best practices, i.e., the principles, for design of new secure processor architectures. Based on the careful review of past work by many computer architects and security researchers, readers also will come to know the five basic principles needed for secure processor architecture design. The book also presents existing research challenges and potential new research directions. Finally, it presents numerous design suggestions, as well as discussing pitfalls and fallacies that designers should avoid.With growing interest in computer security and the protection of the code and data which execute on commodity computers, the amount of hardware security features in today's processors has increased significantly over the recent years. No longer of just academic interest, security features inside processors have been embraced by industry as well, with a number of commercial secure processor architectures available today. This book gives readers insights into the principles behind the design of academic and commercial secure processor architectures. Secure processor architecture research is concerned with exploring and designing hardware features inside computer processors, features which can help protect confidentiality and integrity of the code and data executing on the processor. Unlike traditional processor architecture research that focuses on performance, efficiency, and energy as the first-order design objectives, secure processor architecture design has security as the first-order design objective (while still keeping the others as important design aspects that need to be considered).Table of Contents Preface Acknowledgments Introduction Basic Computer Security Concepts Secure Processor Architectures Trusted Execution Environments Hardware Root of Trust Memory Protections Multiprocessor and Many-Core Protections Side-Channel Threats and Protections Security Verification of Processor Architectures Principles of Secure Processor Architecture Design Bibliography Online Resources Author's Biography
£88.20
No Starch Press,US Dive Into Systems: A Gentle Introduction to
Book SynopsisThis is a crash course in the hard and soft components of any computer system. In introductory-level computer science classes, it'll guide readers to understand computers at various layers of abstraction. Early chapters begin with the basics of the C programming language and the inner workings of operating systems. Later, how to optimize code for various architectures, how memory management works in multi-core CPUs and much more is also covered. Accessible and easy to follow, this book uses images and exercises to break down these complex topics.Trade Review"I’ve read a lot of books on computers in my time—some focused on the hardware and others centered on programming—but I’ve never seen one quite like Dive into Systems. On the one hand, this is a fantastic introduction to C programming for those who already know Python; on the other hand, it dives into the depths of the underlying hardware architecture. And then, after popping up to take a deep breath, there’s another deep dive into the world of assembly language. Suffice it to say that I’ll certainly be recommending this little beauty to my Python-obsessed friends."—Clive “Max” Maxfield, author of Bebop to the Boolean Boogie and How Computers Do Math"Dive into Systems does a great job of introducing hardware architecture, including the language that is often used to communicate with it - the C programming language. C programming concepts were explained by contrasting it with Python concepts and examples, so any experienced Python user will feel right at home with the explanations."—Emily Liu, Security Consultant and Advanced Reviewer"Dive into Systems takes interested developers on tour through computer architecture from the C programming language perspective. The authors take great care to explain critical computer systems concepts with many well-illustrated examples. Each chapter builds on the previous content, providing a rich history and a meticulously constructed dive into computer architecture."—George D., Advanced Reviewer"This is an outstanding book for those teaching an Introduction to Systems Programming class with only a CS 1 prerequisite! The book fills a void, allowing instructors to use one book for C programming, computer organization, assembly language, and systems programming topics instead of needing multiple books for their courses."—David Toth, Associate Professor of Computer Science and Chair of Computer Science Program at Centre College"By introducing students to low-level programming gently through C programming, Matthews, Newhall and Webb have managed to make the fundamental concepts of assembly language approachable and comprehensible. The genius of the book is that it begins the journey at the point that students understand—high level programming—and slowly peel back the abstractions to reveal the reality underneath all computer programs. My students have never understood memory, the fetch-decode-execute cycle and assembly programming in general like they have with this approach. Dive Into Systems brings the revolution in teaching low-level computer concepts . . . to the masses."—John Barr, Computer Science Professor, Ithaca College"An ideal textbook for introductory computer science curriculums. . . . Unreservedly recommended for personal, professional, community, and academic library Computer Science collections" —Midwest Book Review
£56.99
BCS Learning & Development Limited Solution Architecture Foundations
Book SynopsisSolution architecture is a relatively new specialism but is at the very heart of the relationship between business and IT. This book is an authoritative and practical introduction, suitable for new entrants to the field but also of benefit to experienced professionals wishing to consolidate their knowledge and skills. The tools and techniques of solution architecture are presented in the context of a framework and life cycle, taking a problem or idea through logical steps to design a holistic and evidence-based solution. There is a focus on collaboration with the business as well as other disciplines such as enterprise architecture, business analysis and cyber security.Trade ReviewThis book is an enjoyable and refreshing read, offering readers a comprehensive and contextual introduction to the discipline of solution architecture. As organisations are reimagining traditional business models, adopting agile ways of working and accelerating digital transformation agendas, this book highlights the importance of communication and collaboration throughout a solution architecture lifecycle including the voice of the customer and ongoing stakeholder interactions. This book provides a complementary framework for solution architecture that refreshingly re-enforces that ‘…unlike a strict methodology where activities are mandated, a framework is meant to be a guide, not a driver or constraint.' -- Chris Banks MBCS CITP, Director, Workplace Fusion LtdThis book provides a good overview of Solution Architecture Process and its alignment with Enterprise Architecture, -- Sachin Bansal, Enterprise / Lead Solution Architect, IBM Services, UK * *Note - Opinions expressed here are purely personal in individual capacity and do not reflect any endorsement by IBM or any other current/former employers *I recommend this book for those who want to grow their careers in Solution Architecture and for those considering related career roles. Complementing knowledge in specific technologies, this book can enable readers to grow from techniques and ways of thinking that can be applied for varying projects, delivery environments, and stakeholders. With a highly accessible style it will appeal to people with a range of backgrounds or career experiences. -- Mike Broomhead FBCS CITPAt last, a comprehensive study of a complex and often misunderstood subject. In addition to clarifying many aspects of Solution Architecture, the author has added personal insights based on his many years of experience. I particularly liked the sections where Solution Architecture is put into context with Business Architecture and other enterprise wide strategic domains. An excellent and enlightening book for all those interested in the topic of Solution Architecture. -- Paul Turner FBCS, BCS Author and Examiner'The book provides a good, clear, readable introduction to Solution Architecture. The topics are logically presented so that there is progressive style with concepts being illustrated through use of examples drawn from a realistic case study. There are also a good number of activities that the reader can work through. Reference is made to standards and methodologies without becoming fixated on them. It was very enjoyable and easy to read.' -- Dr Quentin Vaughan, Managing Client Partner, IBM Global Business ServicesTable of Contents Introduction to Solution Architecture Solution Architecture in the Context of Business and Enterprise Architecture A Framework for Solution Architecture Inputs to Solution Architecture Gap Analysis Stakeholder Interaction Solution Technology Definition Implementation
£33.24
Octopus Publishing Group The Nostalgia Nerd's Retro Tech: Computer,
Book SynopsisRemember what a wild frontier the early days of home gaming were? Manufacturers releasing new consoles at a breakneck pace; developers creating games that kept us up all night, then going bankrupt the next day; and what self-respecting kid didn't beg their parents for an Atari or a Nintendo? This explosion of computers, consoles, and games was genuinely unlike anything the tech world has seen before or since.This thoroughly researched and geeky trip down memory lane pulls together the most entertaining stories from this dynamic era, and brings you the classic tech that should never be forgotten.
£17.09
Paragon Publishing Enterprise Data Architecture: How to navigate its landscape
£22.99
ISTE Ltd and John Wiley & Sons Inc Model Driven Engineering for Distributed
Book SynopsisModel-based development methods, and supporting technologies, can provide the techniques and tools needed to address the dilemma between reducing system development costs and time, and developing increasingly complex systems. This book provides the information needed to understand and apply model-drive engineering (MDE) and model-drive architecture (MDA) approaches to the development of embedded systems. Chapters, written by experts from academia and industry, cover topics relating to MDE practices and methods, as well as emerging MDE technologies. Much of the writing is based on the presentations given at the Summer School “MDE for Embedded Systems” held at Brest, France, in September 2004.Table of ContentsChapter Summary xi Chapter 1. Model Transformation: A Survey of the State of the Art 1 Tom MENS 1.1. Model-driven engineering 1 1.2. Model transformation 2 1.3. Model transformation languages 5 1.4. Model transformation activities 8 1.5. Conclusion 14 1.6. Acknowledgements 14 1.7. Bibliography 15 Chapter 2. Model-Based Code Generation 21 Chris RAISTRICK 2.1. Introduction 21 2.2. The model-driven architecture (MDA) process 22 2.3. The automated approach to code generation 23 2.4. Domain modeling 25 2.5. The executable UML (xUML) formalism 29 2.6. System generation 31 2.7. Executable UML to code mappings 34 2.8. Conclusions 41 2.9. Bibliography 42 Chapter 3. Testing Model Transformations: A Case for Test Generation from Input Domain Models 43 Benoit BAUDRY 3.1. Introduction 43 3.2. Challenges for testing systems with large input domains 46 3.3. Selecting test data in large domains 52 3.4. Metamodel-based test input generation 58 3.5. Conclusion 67 3.6. Acknowledgements 68 3.7. Bibliography 68 Chapter 4. Symbolic Execution-Based Techniques for Conformance Testing 73 Christophe GASTON, Pascale LE GALL, Nicolas RAPIN and Assia TOUIL 4.1. Context 73 4.2. Input output symbolic transition systems 79 4.3. Symbolic execution 84 4.4. Conformance testing for IOSTS 87 4.5. Concluding remarks 96 4.6. Bibliography 101 Chapter 5. Using MARTE and SysML for Modeling Real-Time Embedded Systems 105 Huascar ESPINOZA, Daniela CANCILA, Sébastien GÉRARD and Bran SELIC 5.1. Introduction 105 5.2. Background 108 5.3. Scenarios of combined usage 113 5.4. Combination Strategies 125 5.5. Related work 130 5.6. Conclusion 133 5.7. Acknowledgements 134 5.8. Bibliography 134 Chapter 6. Software Model-based Performance Analysis 139 Dorina C. PETRIU 6.1. Introduction 139 6.2. Performance models 142 6.3. Software model with performance annotations 148 6.4. Mapping from software to performance model 155 6.5. Using a pivot language: Core Scenario Model (CSM) 158 6.6. Case study performance model 160 6.7. Conclusions 162 6.8. Acknowledgements 163 6.9. Bibliography 163 Chapter 7. Model Integration for Formal Qualification of Timing-Aware Software Data Acquisition Components 167 Jean-Philippe BABAU, Philippe DHAUSSY and Pierre-Yves PILLAIN 7.1. Introduction 167 7.2. System modeling 170 7.3. Variation points modeling 182 7.4. Experiments and results 189 7.5. Conclusion 194 7.6. Bibliography 195 Chapter 8. SoC/SoPC Development using MDD and MARTE Profile 201 Denis AULAGNIER, Ali KOUDRI, Stéphane LECOMTE, Philippe SOULARD, Joël CHAMPEAU, Jorgiano VIDAL, Gilles PERROUIN and Pierre LERAY 8.1. Introduction 201 8.2. Related works 203 8.3. MOPCOM process and models 206 8.4. Application 210 8.5. System analysis 211 8.6. Abstract modeling level 214 8.7. Execution modeling level 216 8.8. Detailed modeling level 220 8.9. Tooling Support 223 8.10. HDL Code Generation 225 8.11. Conclusion 228 8.12. Acknowledgements 229 8.13. Bibliography 229 List of Authors 233 Index 237
£132.00
ISTE Ltd and John Wiley & Sons Inc Safety of Computer Architectures
Book SynopsisIt is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effective system architecture. It is not so easy to find a single source reference for all these aspects of system design. However, the purpose of this book is to present, in a single volume, a full description of all the constraints (including legal contexts around performance, reliability norms, etc.) and examples of architectures from various fields of application, including: railways, aeronautics, space, automobile and industrial automation. The content of the book is drawn from the experience of numerous people who are deeply immersed in the design and delivery (from conception to test and validation), safety (analysis of safety: FMEA, HA, etc.) and evaluation of critical systems. The involvement of real world industrial applications is handled in such as a way as to avoid problems of confidentiality, and thus allows for the inclusion of new, useful information (photos, architecture plans/schematics, real examples).Trade Review"The text is clearly written, well-illustrated, and includes a helpful glossary." (Booknews, 1 February 2011)Table of ContentsIntroduction xiii Chapter 1. Principles 1 Jean-Louis BOULANGER 1.1. Introduction 1 1.2. Presentation of the basic concepts: faults, errors and failures 1 1.3. Safe and/or available architecture 7 1.4. Resetting a processing unit 7 1.5. Overview of safety techniques 8 1.6. Conclusion 45 1.7. Bibliography 45 Chapter 2. Railway Safety Architecture 47 Jean-Louis BOULANGER 2.1. Introduction 47 2.2. Coded secure processor 47 2.3. Other applications 53 2.4. Regulatory and normative context 60 2.5. Conclusion 66 2.6. Bibliography 66 Chapter 3. From the Coded Uniprocessor to 2oo3 69 Gilles LEGOFF and Christophe GIRARD 3.1. Introduction 69 3.2. From the uniprocessor to the dual processor with voter 71 3.3. CSD: available safety computer 80 3.4. DIVA evolutions 93 3.5. New needs and possible solutions 99 3.6. Conclusion 101 3.7. Assessment of installations 102 3.8. Bibliography 103 Chapter 4. Designing a Computerized Interlocking Module: a Key Component of Computer-Based Signal Boxes Designed by the SNCF 105 Marc ANTONI 4.1. Introduction 105 4.2. Issues 107 4.3. Railway safety: fundamental notions 116 4.4. Development of the computerized interlocking module 124 4.5. Conclusion 145 4.6. Bibliography 147 Chapter 5. Command Control of Railway Signaling Safety: Safety at Lower Cost 149 Daniel DRAGO 5.1. Introduction 149 5.2. A safety coffee machine 149 5.3. History of the PIPC 150 5.4. The concept basis 155 5.5. Postulates for safety requirements 157 5.6. Description of the PIPC architecture7 159 5.7. Description of availability principles 173 5.8. Software architecture 176 5.9. Protection against causes of common failure 186 5.10. Probabilistic modeling 188 5.11. Summary of safety concepts 194 5.12. Conclusion 197 5.13. Bibliography 198 Chapter 6. Dependable Avionics Architectures: Example of a Fly-by-Wire system 199 Pascal TRAVERSE, Christine BEZARD, Jean-Michel CAMUS, Isabelle LACAZE, Hervé LEBERRE, Patrick RINGEARD and Jean SOUYRIS 6.1. Introduction 199 6.2. System breakdowns due to physical failures 205 6.3. Manufacturing and design errors 215 6.4. Specific risks 223 6.5. Human factors in the development of flight controls 225 6.6. Conclusion 229 6.7. Bibliography 229 Chapter 7. Space Applications 233 Jean-Paul BLANQUART and Philippe MIRAMONT 7.1. Introduction 233 7.2. Space system 233 7.3. Context and statutory obligation 237 7.4. Specific needs 243 7.5. Launchers: the Ariane 5 example 252 7.6. Satellite architecture 281 7.7. Orbital transport: ATV example 292 7.8. Summary and conclusions 302 7.9. Bibliography 304 Chapter 8. Methods and Calculations Relative to “Safety Instrumented Systems” at TOTAL 307 Yassine CHAABI and Jean-Pierre SIGNORET 8.1. Introduction 307 8.2. Specific problems to be taken into account 308 8.3. Example 1: system in 2/3 modeled by fault trees 322 8.4. Example 2: 2/3 system modeled by the stochastic Petri net 328 8.5. Other considerations regarding HIPS 333 8.6. Conclusion 342 8.7. Bibliography 343 Chapter 9. Securing Automobile Architectures 345 David LIAIGRE 9.1. Context 345 9.2. More environmentally-friendly vehicles involving more embedded electronics 347 9.3. Mastering the complexity of electronic systems 348 9.4. Security concepts in the automotive field 350 9.5. Which security concepts for which security levels of the ISO 26262 standard? 364 9.6. Conclusion 376 9.7. Bibliography 377 Chapter 10. SIS in Industry 379 Grégory BUCHHEIT and Olaf MALASSE 10.1. Introduction 379 10.2. Safety loop structure 384 10.3. Constraints and requirements of the application 407 10.4. Analysis of a safety loop 413 10.5. Conclusion 423 10.6. Bibliography 424 Chapter 11. A High-Availability Safety Computer 425 Sylvain BARO 11.1. Introduction 425 11.2. Safety computer 426 11.3. Applicative redundancy 433 11.4. Integrated redundancy 433 11.5. Conclusion 443 11.6. Bibliography 446 Chapter 12. Safety System for the Protection of Personnel in the CERN Large Hadron Collider 447 Pierre NININ, Silvia GRAU, Tomasz LADZINSKI and Francesco VALENTINI 12.1. Introduction 447 12.2. LACS 450 12.3. LASS 452 12.4. Functional safety methodology 459 12.5. Test strategy 466 12.6. Feedback 472 12.7. Conclusions 473 12.8. Bibliography 474 Glossary 477 List of Authors 485 Index 487
£132.00
ISTE Ltd and John Wiley & Sons Inc Smart SOA Platforms in Cloud Computing
Book SynopsisThis book is intended to introduce the principles of the Event-Driven and Service-Oriented Architecture (SOA 2.0) and its role in the new interconnected world based on the cloud computing architecture paradigm. In this new context, the concept of “service” is widely applied to the hardware and software resources available in the new generation of the Internet. The authors focus on how current and future SOA technologies provide the basis for the smart management of the service model provided by the Platform as a Service (PaaS) layer.Table of Contents1. ESBay Case Study. 2. Service-Oriented and Cloud Computing Architectures. 3. SPaaS 1.0 Cookbook. 4. SSOAPaaS 1.0 Cookbook. 5. SSOAPaaS 2.0 Cookbook. 6. SSOAPaaS 3.0 Cookbook.
£125.06
ISTE Ltd and John Wiley & Sons Inc Software Architecture 2
Book SynopsisOver the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.Table of ContentsChapter 1. Metamodeling in Software Architectures 1 Adel SMEDA and Mourad Chabane OUSSALAH 1.1. Introduction 1 1.2. Metamodeling, why? 3 1.3. Software architecture metamodeling 3 1.4. MADL: a meta-architecture description language 5 1.4.1. Four levels of modeling in software architectures 5 1.4.2. MADL: reflexive core dedicated to the meta-meta-architecture 7 1.4.3. MADL structure 8 1.4.4. MADL instantiation: example of the ADL Acme 11 1.4.5. Comparison of MADL and MDA/MOF 13 1.5. Mapping of ADLs to UML 17 1.5.1. Why to map an ADL to UML? 18 1.5.2. ADL mapping to UML 19 1.6. A mapping example: the case of the Acme language. 31 1.7. Some remarks on the mapping of ADL concepts to UML 32 1.7.1. UML 2.0 as an ADL 32 1.7.2. Mapping strategies 33 1.8. Conclusion 34 1.9. Bibliography 34 Chapter 2. Architecture Constraints 37 Chouki TIBERMACINE 2.1. Introduction 38 2.2. State of the art 40 2.2.1. Expression of architecture constraints in the design phase 40 2.2.2. Expression of architecture constraints in the implementation phase 49 2.3. Architecture constraints on object-oriented applications 57 2.3.1. Architecture constraints in the design phase 57 2.3.2. Architecture constraints in the implementation phase 61 2.4. Architecture constraints on component-based applications 68 2.4.1. Architecture constraints in the design phase 69 2.4.2. Architecture constraints in the implementation phase 75 2.5. Architecture constraints on service-oriented applications 79 2.6. Conclusion 85 2.7. Bibliography 86 Chapter 3. Software Architectures and Multiple Variability 91 Mathieu ACHER, Philippe COLLET and Philippe LAHIRE 3.1. Introduction 91 3.2. Variability: foundations and principles 95 3.2.1. Variability and product lines 95 3.2.2. Feature models 97 3.3. Framework of studies and connected work 99 3.3.1. From multiplicity to variability 100 3.3.2. Extraction and evolution of architectural variability 101 3.4. Video surveillance component architecture 102 3.4.1. Case study 102 3.4.2. Accounting for multiple variability 104 3.4.3. Results 108 3.5. SOA for scientific workflows 110 3.5.1. Case study 110 3.5.2. Accounting for multiple variability 112 3.5.3. Results 114 3.6. Reverse engineering plugin-based architecture 116 3.6.1. Case study 116 3.6.2. Accounting for multiple variability 118 3.6.3. Results 120 3.7. Evaluation 122 3.7.1. The necessity of tooling 122 3.7.2. Summary of case studies 123 3.8. Conclusion 125 3.9. Bibliography 126 Chapter 4. Architecture and Quality of Software Systems 133 Nicole LÉVY, Francisca LOSAVIO and Yann POLLET 4.1. Introduction 133 4.2. Quality approach 135 4.2.1. ISO 25010 quality 135 4.2.2. Quality reference 137 4.2.3. Quality model of a system 138 4.2.4. Functional quality model 139 4.2.5. Quality model of the architecture 140 4.3. Approach for architecture development of a domain 142 4.3.1. General principles 142 4.3.2. Functional quality model 145 4.3.3. Architectural quality model 145 4.3.4. Reference architecture 145 4.3.5. Transition from domain level to system level 147 4.4. Development of the reference architecture in a functional domain 148 4.4.1. Example of functional domain 148 4.4.2. Functional refinement 148 4.4.3. Development of the FQM 150 4.4.4. Definition of the preliminary architecture 151 4.4.5. Development of architectural quality model 152 4.4.6. Integration of the reference architecture of the domain 152 4.5. Architectures at system level 156 4.5.1. Functional refinement 156 4.5.2. Functional quality model 157 4.5.3. Basic architecture 158 4.5.4. Architectural quality model 158 4.5.5. Architecture of the Dopamine and Samarkand systems 159 4.6. Related work 161 4.7. Conclusion 166 4.8. Bibliography 167 Chapter 5. Software Architectures and Multiagent Systems 171 Jean-Paul ARCANGELI, Victor NOËL and Frédéric MIGEON 5.1. Introduction 172 5.2. MAS and agent-oriented software engineering 172 5.2.1. Agent 173 5.2.2. System and interactions 174 5.2.3. MAS 175 5.2.4. Examples of MAS 177 5.2.5. Agent-oriented software engineering 178 5.3. MAS as an architectural style 183 5.3.1. Positioning the “MAS” style 183 5.3.2. Characteristics in terms of abstraction 184 5.3.3. Characteristics in terms of (de)composition 188 5.3.4. Link with the requirements 190 5.3.5. A family of architectural styles 194 5.4. The architectural gap 195 5.4.1. State of the practice 196 5.4.2. Analysis from an architectural point of view 197 5.4.3. Assessment 200 5.5. How to fill the architectural gap 200 5.5.1. Limitations of existing solutions 200 5.5.2. Realization of the microarchitecture 201 5.6. Conclusion 204 5.7. Bibliography 205 Chapter 6. Software Architectures and Software Processes 209 Fadila AOUSSAT, Mourad Chabane OUSSALAH and Mohamed AHMED-NACER 6.1. Introduction 209 6.2. Software process architectures 211 6.2.1. Software process models: definition 211 6.2.2. Modeling software architecture-based software processes 213 6.3. Comparison framework for SA-based SP model reuse solutions 214 6.3.1. The software process axis evaluation criteria 217 6.3.2. The software architecture axis evaluation criteria 220 6.3.3. The quality axis evaluation criteria 223 6.4. Evaluation of SA-based SP modeling and execution approaches 225 6.4.1. SP axis evaluation of SA-based SP reuse approaches 225 6.4.2. SA axis evaluation of SA-based SP reuse approaches 229 6.4.3. Quality axis evaluation of SA-based SP reuse approaches 232 6.4.4. Assessment and discussions 234 6.5. Conclusion 235 6.6. Bibliography 236 List of Authors 241 Index 243
£125.06
ISTE Ltd and John Wiley & Sons Inc Transformation of Collective Intelligences:
Book SynopsisThere is a great transformation of the production of knowledge and intelligibility. The "digital fold of the world" (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also controversial issues. From a general standpoint, these debates concern “performative science and performative society”. But one emerges and strengthens that has several names: transhumanism, post-humanism, speculative post-humanism. It appears as a great narration, a large story about the future of our existence, facing our entry into the Anthropocene. It is also presented as a concrete utopia with an anthropological and technical change. In this book, we proposed to show how collective intelligences stand in the middle of the coupling of ontological horizons and of the “process of bio-technical maturation”.Table of ContentsIntroduction ix Chapter 1. Elements of the General Configuration and Adaptive Landscape of Collective Intelligences 1 1.1. The intertwined narratives of tangible utopias and brilliant futures 1 1.2. Intelligence is “always already collective and machined” 5 1.3. Collective intelligences in the weaving of data 9 1.4. Semiotics and statistics 13 1.5. Data cities and human becomings: the new milieus of intelligence 17 1.5.1. Open Data (OD): a heterogeneous movement, the contribution to novel forms of knowledge in question 22 1.6. Coupling OD/big data/data mining 32 1.7. The semantic web as intellectual technology 34 1.8. Toward understanding onto-ethologies 42 1.9. Marketing intelligences: data and graphs in the heat of passions 50 1.10. Personal data: private property as an open and unstable process 59 1.11. The figures of the network 64 1.12. Machinic interfaces: social subjection and enslavement 67 1.13. Collective intelligences and anthropological concerns 70 1.14. Toward a new encyclopedic state: first overview 74 1.15. Controversies and boundaries 78 1.16. The milieus of intelligence and knowledge 84 1.17. Which criteria for writings? 86 1.18. Collective intelligences of usage and doxic collective intelligences: the status of short forms 90 1.19. Collective intelligences, self-organization, “swarm” intelligences 92 1.20. Short forms, relinkage, relaunching 99 1.21. Insomniac commentary as a catastrophic correction of short forms 100 1.22. Twitter as a Markovian Territory: a few remarks 103 Chapter 2. Post- and Transhumanist Horizons 107 2.1. Some bioanthropotechnical transformations 107 2.2. What to do with our brain? 113 2.3. About transhumanism and speculative posthumanism 122 2.4. Epigenetic and epiphylogenetic plasticity 125 2.5. Speculative uncertainties 127 2.6. Trans- and posthumanism as they present themselves 152 Chapter 3. Fragmented Encyclopedism 169 3.1. Collective intelligences and the encyclopedic problem 169 3.2. The political utopia in store 170 3.3. Encyclopedism and digital publishing modes 174 3.4. A new documentary process 176 3.5. Fragmented encyclopedism: education/interfaces 190 3.6. Encyclopedism and correlations 192 3.6.1. “Correlation is enough”: the Anderson controversy, and the J. Gray paradigm and their limits 192 3.7. “Perplication” in knowledge 198 3.7.1. Doxic tension in fragmented encyclopedism and format accordingly 198 3.8. Networks of the digital environment 199 3.8.1. Variations of speed and slowness at the center of encyclopedic pragmatics 200 3.9. Knowledge and thought in fragmented encyclopedism 201 3.10. What criteriology for encyclopedic writings? 202 3.11. Borders in fragmented encyclopedism: autoimmune disorders and disagreement 205 3.12. Fragmented encyclopedism: a habitat for controversies? 207 3.13. Encyclopedism according to the semantic and sociosemantic web (ontologies and web): mapping(s) and semantic levels 209 3.14. From ontologies to “onto-ethologies” and assemblages 212 3.15. Fragmented encyclopedism in the digital age: metalanguage and combinatorial 214 3.15.1. Encyclopedism and doxic immanence field: the proliferation of short forms 216 3.16. From fragmented encyclopedism to gaseous encyclopedism 217 Bibliography 219 Index 233Conclusion
£125.06
College Publications Beyond Alignment: Applying Systems Thinking in Architecting Enterprises
£24.70
Taylor & Francis Ltd How to Set Up Information Systems: A
Book SynopsisThis introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.Trade Review[An] excellent book.' Guy Fitzgerald, , Professor of Information Systems, Brunel University 'The book stands out in its field through the intelligent and constructive use of the soft systems methodology to develop the themes' Peter Roberts, former Visiting Professor, Open University and City University 'A useful text for teachers and practitioners of a Multiview approach to information analysis and design. It has matured and gained focus in this new edition' Gilbert Mansell, Head of Department of Multimedia and Information Systems, University of Huddersfield 'A textbook for people intending to practice information systems analysis and design.' SciTech Book NewsTable of ContentsInformation Systems and Organization * What is Systems Analysis and Systems Design? * The Role of the Systems Planner or Systems Analyst * Selecting Planning and Development Tools * The Human Activity System: Making a Model * Information Modelling: Making a Workable System * Technical and Social Needs: The Balance * The Human-Computer Interface * Technical Aspects: What is Needed? * Total Design, Training, Hardware, Software and Implementation * Glossary, Appendices, Further Reading, Index
£123.50
Taylor & Francis Ltd How to Set Up Information Systems: A
Book SynopsisThis introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.Trade Review[An] excellent book.' Guy Fitzgerald, , Professor of Information Systems, Brunel University 'The book stands out in its field through the intelligent and constructive use of the soft systems methodology to develop the themes' Peter Roberts, former Visiting Professor, Open University and City University 'A useful text for teachers and practitioners of a Multiview approach to information analysis and design. It has matured and gained focus in this new edition' Gilbert Mansell, Head of Department of Multimedia and Information Systems, University of Huddersfield 'A textbook for people intending to practice information systems analysis and design.' SciTech Book NewsTable of ContentsInformation Systems and Organization * What is Systems Analysis and Systems Design? * The Role of the Systems Planner or Systems Analyst * Selecting Planning and Development Tools * The Human Activity System: Making a Model * Information Modelling: Making a Workable System * Technical and Social Needs: The Balance * The Human-Computer Interface * Technical Aspects: What is Needed? * Total Design, Training, Hardware, Software and Implementation * Glossary, Appendices, Further Reading, Index
£52.24
AU Press Mind, Body, World: Foundations of Cognitive
Book SynopsisCognitive science arose in the 1950s when it became apparent that anumber of disciplines, including psychology, computer science,linguistics, and philosophy, were fragmenting. Perhaps owing to thefield’s immediate origins in cybernetics, as well as to thefoundational assumption that cognition is information processing,cognitive science initially seemed more unified than psychology.However, as a result of differing interpretations of the foundationalassumption and dramatically divergent views of the meaning of the terminformation processing, three separate schools emerged:classical cognitive science, connectionist cognitive science, andembodied cognitive science. Examples, cases, and research findings taken from the wide range ofphenomena studied by cognitive scientists effectively explain andexplore the relationship among the three perspectives. Intended tointroduce both graduate and senior undergraduate students to thefoundations of cognitive science, Mind, Body, World addressesa number of questions currently being asked by those practicing in thefield: What are the core assumptions of the three different schools?What are the relationships between these different sets of coreassumptions? Is there only one cognitive science, or are there manydifferent cognitive sciences? Giving the schools equal treatment anddisplaying a broad and deep understanding of the field, Dawsonhighlights the fundamental tensions and lines of fragmentation thatexist among the schools and provides a refreshing and unifyingframework for students of cognitive science.Table of ContentsList of Figures and Tables | ix Preface | xiii Who Is This Book Written For? | xiv Acknowledgements | xv Chapter 1. The Cognitive Sciences: One or Many? | 1 1.0 Chapter Overview | 1 1.1 A Fragmented Psychology | 2 1.2 A Unified Cognitive Science | 3 1.3 Cognitive Science or the Cognitive Sciences? | 6 1.4 Cognitive Science: Pre-paradigmatic? | 13 1.5 A Plan of Action | 16 Chapter 2. Multiple Levels of Investigation | 19 2.0 Chapter Overview | 19 2.1 Machines and Minds | 20 2.2 From the Laws of Thought to Binary Logic | 23 2.3 From the Formal to the Physical | 29 2.4 Multiple Procedures and Architectures | 32 2.5 Relays and Multiple Realizations | 35 2.6 Multiple Levels of Investigation and Explanation | 38 2.7 Formal Accounts of Input-Output Mappings | 40 2.8 Behaviour by Design and by Artifact | 41 2.9 Algorithms from Artifacts | 43 2.10 Architectures against Homunculi | 46 2.11 Implementing Architectures | 48 2.12 Levelling the Field | 51 Chapter 3. Elements of Classical Cognitive Science | 55 3.0 Chapter Overview | 55 3.1 Mind, Disembodied | 56 3.2 Mechanizing the Infinite | 59 3.3 Phrase Markers and Fractals | 65 3.4 Behaviourism, Language, and Recursion | 68 3.5 Underdetermination and Innateness | 72 3.6 Physical Symbol Systems | 75 3.7 Componentiality, Computability, and Cognition | 78 3.8 The Intentional Stance | 82 3.9 Structure and Process | 85 3.10 A Classical Architecture for Cognition | 89 3.11 Weak Equivalence and the Turing Test | 93 3.12 Towards Strong Equivalence | 97 3.13 The Impenetrable Architecture | 106 3.14 Modularity of Mind | 113 3.15 Reverse Engineering | 119 3.16 What is Classical Cognitive Science? | 122 Chapter 4. Elements of Connectionist Cognitive Science | 125 4.0 Chapter Overview | 125 4.1 Nurture versus Nature | 126 4.2 Associations | 133 4.3 Nonlinear Transformations | 139 4.4 The Connectionist Sandwich | 142 4.5 Connectionist Computations: An Overview | 148 4.6 Beyond the Terminal Meta-postulate | 149 4.7 What Do Output Unit Activities Represent? | 152 4.8 Connectionist Algorithms: An Overview | 158 4.9 Empiricism and Internal Representations | 159 4.10 Chord Classification by a Multilayer Perceptron | 162 4.11 Trigger Features | 172 4.12 A Parallel Distributed Production System | 177 4.13 Of Coarse Codes | 184 4.14 Architectural Connectionism: An Overview | 188 4.15 New Powers of Old Networks | 189 4.16 Connectionist Reorientation | 193 4.17 Perceptrons and Jazz Progressions | 195 4.18 What Is Connectionist Cognitive Science? | 198 Chapter 5. Elements of Embodied Cognitive Science | 205 5.0 Chapter Overview | 205 5.1 Abandoning Methodological Solipsism | 206 5.2 Societal Computing | 210 5.3 Stigmergy and Superorganisms | 212 5.4 Embodiment, Situatedness, and Feedback | 216 5.5 Umwelten, Affordances, and Enactive Perception | 219 5.6 Horizontal Layers of Control | 222 5.7 Mind in Action | 224 5.8 The Extended Mind | 230 5.9 The Roots of Forward Engineering | 235 5.10 Reorientation without Representation | 239 5.11 Robotic Moments in Social Environments | 245 5.12 The Architecture of Mind Reading | 250 5.13 Levels of Embodied Cognitive Science | 255 5.14 What Is Embodied Cognitive Science? | 260 Chapter 6. Classical Music and Cognitive Science | 265 6.0 Chapter Overview | 265 6.1 The Classical Nature of Classical Music | 266 6.2 The Classical Approach to Musical Cognition | 273 6.3 Musical Romanticism and Connectionism | 280 6.4 The Connectionist Approach to Musical Cognition | 286 6.5 The Embodied Nature of Modern Music | 291 6.6 The Embodied Approach to Musical Cognition | 301 6.7 Cognitive Science and Classical Music | 307 Chapter 7. Marks of the Classical? | 315 7.0 Chapter Overview | 315 7.1 Symbols and Situations | 316 7.2 Marks of the Classical | 324 7.3 Centralized versus Decentralized Control | 326 7.4 Serial versus Parallel Processing | 334 7.5 Local versus Distributed Representations | 339 7.6 Internal Representations | 343 7.7 Explicit Rules versus Implicit Knowledge | 345 7.8 The Cognitive Vocabulary | 348 7.9 From Classical Marks to Hybrid Theories | 355 Chapter 8. Seeing and Visualizing | 359 8.0 Chapter Overview | 359 8.1 The Transparency of Visual Processing | 360 8.2 The Poverty of the Stimulus | 362 8.3 Enrichment via Unconscious Inference | 368 8.4 Natural Constraints | 371 8.5 Vision, Cognition, and Visual Cognition | 379 8.6 Indexing Objects in the World | 383
£33.15
Morgan & Claypool Publishers An Architecture for Fast and General Data
Book SynopsisThe past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too.This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing.We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective.This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.Table of Contents Preface 1. Introduction 2. Resilient Distributed Datasets 3. Models Built over RDDs 4. Discretized Streams 5. Generality of RDDs 6. Conclusion References Author's Biography
£49.50
Morgan & Claypool Publishers An Architecture for Fast and General Data Processing on Large Clusters
Book SynopsisThe past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too.This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing.We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective.This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.Table of Contents Preface 1. Introduction 2. Resilient Distributed Datasets 3. Models Built over RDDs 4. Discretized Streams 5. Generality of RDDs 6. Conclusion References Author's Biography
£60.00
Morgan & Claypool Publishers Shared-Memory Parallelism Can Be Simple, Fast,
Book SynopsisParallelism is the key to achieving high performance in computing. However, writing efficient and scalable parallel programs is notoriously difficult, and often requires significant expertise. To address this challenge, it is crucial to provide programmers with high-level tools to enable them to develop solutions easily, and at the same time emphasize the theoretical and practical aspects of algorithm design to allow the solutions developed to run efficiently under many different settings. This thesis addresses this challenge using a three-pronged approach consisting of the design of shared-memory programming techniques, frameworks, and algorithms for important problems in computing. The thesis provides evidence that with appropriate programming techniques, frameworks, and algorithms, shared-memory programs can be simple, fast, and scalable, both in theory and in practice. The results developed in this thesis serve to ease the transition into the multicore era.The first part of this thesis introduces tools and techniques for deterministic parallel programming, including means for encapsulating nondeterminism via powerful commutative building blocks, as well as a novel framework for executing sequential iterative loops in parallel, which lead to deterministic parallel algorithms that are efficient both in theory and in practice. The second part of this thesis introduces Ligra, the first high-level shared memory framework for parallel graph traversal algorithms. The framework allows programmers to express graph traversal algorithms using very short and concise code, delivers performance competitive with that of highly-optimized code, and is up to orders of magnitude faster than existing systems designed for distributed memory. This part of the thesis also introduces Ligra , which extends Ligra with graph compression techniques to reduce space usage and improve parallel performance at the same time, and is also the first graph processing system to support in-memory graph compression.The third and fourth parts of this thesis bridge the gap between theory and practice in parallel algorithm design by introducing the first algorithms for a variety of important problems on graphs and strings that are efficient both in theory and in practice. For example, the thesis develops the first linear-work and polylogarithmic-depth algorithms for suffix tree construction and graph connectivity that are also practical, as well as a work-efficient, polylogarithmic-depth, and cache-efficient shared-memory algorithm for triangle computations that achieves a 2–5x speedup over the best existing algorithms on 40 cores.This is a revised version of the thesis that won the 2015 ACM Doctoral Dissertation Award.Table of Contents Introduction Preliminaries and Notation Programming Techniques for Deterministic Parallelism Internally Deterministic Parallelism: Techniques and Algorithms Deterministic Parallelism in Sequential Iterative Algorithms A Deterministic Phase-Concurrent Parallel Hash Table Priority Updates: A Contention-Reducing Primitive for Deterministic Programming Large-Scale Shared-Memory Graph Analytics Ligra: A Lightweight Graph Processing Framework for Shared Memory Ligra : Adding Compression to Ligra Parallel Graph Algorithms Linear-Work Parallel Graph Connectivity Parallel and Cache-Oblivious Triangle Computations Parallel String Algorithms Parallel Cartesian Tree and Suffix Tree Construction Parallel Computation of Longest Common Prefixes Parallel Lempel-Ziv Factorization Parallel Wavelet Tree Construction Conclusion and Future Work Bibliography
£75.65
Morgan & Claypool Publishers Shared-Memory Parallelism Can Be Simple, Fast,
Book SynopsisParallelism is the key to achieving high performance in computing. However, writing efficient and scalable parallel programs is notoriously difficult, and often requires significant expertise. To address this challenge, it is crucial to provide programmers with high-level tools to enable them to develop solutions easily, and at the same time emphasize the theoretical and practical aspects of algorithm design to allow the solutions developed to run efficiently under many different settings. This thesis addresses this challenge using a three-pronged approach consisting of the design of shared-memory programming techniques, frameworks, and algorithms for important problems in computing. The thesis provides evidence that with appropriate programming techniques, frameworks, and algorithms, shared-memory programs can be simple, fast, and scalable, both in theory and in practice. The results developed in this thesis serve to ease the transition into the multicore era.The first part of this thesis introduces tools and techniques for deterministic parallel programming, including means for encapsulating nondeterminism via powerful commutative building blocks, as well as a novel framework for executing sequential iterative loops in parallel, which lead to deterministic parallel algorithms that are efficient both in theory and in practice. The second part of this thesis introduces Ligra, the first high-level shared memory framework for parallel graph traversal algorithms. The framework allows programmers to express graph traversal algorithms using very short and concise code, delivers performance competitive with that of highly-optimized code, and is up to orders of magnitude faster than existing systems designed for distributed memory. This part of the thesis also introduces Ligra , which extends Ligra with graph compression techniques to reduce space usage and improve parallel performance at the same time, and is also the first graph processing system to support in-memory graph compression.The third and fourth parts of this thesis bridge the gap between theory and practice in parallel algorithm design by introducing the first algorithms for a variety of important problems on graphs and strings that are efficient both in theory and in practice. For example, the thesis develops the first linear-work and polylogarithmic-depth algorithms for suffix tree construction and graph connectivity that are also practical, as well as a work-efficient, polylogarithmic-depth, and cache-efficient shared-memory algorithm for triangle computations that achieves a 2–5x speedup over the best existing algorithms on 40 cores.This is a revised version of the thesis that won the 2015 ACM Doctoral Dissertation Award.Table of Contents Introduction Preliminaries and Notation Programming Techniques for Deterministic Parallelism Internally Deterministic Parallelism: Techniques and Algorithms Deterministic Parallelism in Sequential Iterative Algorithms A Deterministic Phase-Concurrent Parallel Hash Table Priority Updates: A Contention-Reducing Primitive for Deterministic Programming Large-Scale Shared-Memory Graph Analytics Ligra: A Lightweight Graph Processing Framework for Shared Memory Ligra : Adding Compression to Ligra Parallel Graph Algorithms Linear-Work Parallel Graph Connectivity Parallel and Cache-Oblivious Triangle Computations Parallel String Algorithms Parallel Cartesian Tree and Suffix Tree Construction Parallel Computation of Longest Common Prefixes Parallel Lempel-Ziv Factorization Parallel Wavelet Tree Construction Conclusion and Future Work Bibliography
£89.25
Springer Nature Switzerland AG Fundamentals of Computer Architecture and Design
Book SynopsisThis textbook provides semester-length coverage of computer architecture and design, providing a strong foundation for students to understand modern computer system architecture and to apply these insights and principles to future computer designs. It is based on the author’s decades of industrial experience with computer architecture and design, as well as with teaching students focused on pursuing careers in computer engineering. Unlike a number of existing textbooks for this course, this one focuses not only on CPU architecture, but also covers in great detail in system buses, peripherals and memories. This book teaches every element in a computing system in two steps. First, it introduces the functionality of each topic (and subtopics) and then goes into “from-scratch design” of a particular digital block from its architectural specifications using timing diagrams. The author describes how the data-path of a certain digital block is generated using timing diagrams, a method which most textbooks do not cover, but is valuable in actual practice. In the end, the user is ready to use both the design methodology and the basic computing building blocks presented in the book to be able to produce industrial-strength designs.Trade Review“This book can be part of computer engineering and electrical engineering graduate coursework and can be a reference book for engineers. It takes a bottom-up approach in which the author has covered basic principles before going into the breadth and depth of complex topics. It can broadly be divided in three sections: logic design, I/O, and central processing unit (CPU) design.” (Krishna Nagar, Computing Reviews , January, 25 , 2018) Table of ContentsReview Of Combinational Circuits.- Review Of Sequential Circuits.- Review Of Asynchronous Circuits.- System Bus.- Memory Circuits And Systems.- Central Processing Unit.- System Peripherals.- Special Topics.- Appendix.
£94.99
Springer Nature Switzerland AG High-Performance Modelling and Simulation for Big Data Applications: Selected Results of the COST Action IC1406 cHiPSet
Book SynopsisThis open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, scale, and accuracy have become essential to predict and analyse natural and complex systems in science and engineering. When their level of abstraction raises to have a better discernment of the domain at hand, their representation gets increasingly demanding for computational and data resources. On the other hand, High Performance Computing typically entails the effective use of parallel and distributed processing units coupled with efficient storage, communication and visualisation systems to underpin complex data-intensive applications in distinct scientific and technical domains. It is then arguably required to have a seamless interaction of High Performance Computing with Modelling and Simulation in order to store, compute, analyse, and visualise large data sets in science and engineering. Funded by the European Commission, cHiPSet has provided a dynamic trans-European forum for their members and distinguished guests to openly discuss novel perspectives and topics of interests for these two communities. This cHiPSet compendium presents a set of selected case studies related to healthcare, biological data, computational advertising, multimedia, finance, bioinformatics, and telecommunications.Table of ContentsWhy High-Performance Modelling and Simulation for Big Data Applications Matters.- Parallelization of hierarchical matrix algorithms for electromagnetic scattering problems.- Tail Distribution and Extreme Quantile Estimation using Non-Parametric Approaches.- Towards efficient and scalable data-intensive content delivery: State-of-the-art, issues and challenges.- Big Data in 5G Distributed Applications.- Big Data Processing, Analysis and Applications in Mobile Cellular Networks.- Medical Data Processing and Analysis for Remote Health and Activities Monitoring.- Towards human cell simulation.- Cloud-based High Throughput Virtual Screening in Novel Drug Discovery.- Ultra Wide Band Body Area Networks: Design and integration with Computational Clouds.- Survey on AI-based multimodal methods for emotion detection.- Forecasting Cryptocurrency Value by Sentiment Analysis: An HPC-oriented Survey of the State-of-the-Art in the Cloud Era.
£40.49
Springer Nature Switzerland AG Architecture of Computing Systems – ARCS 2019: 32nd International Conference, Copenhagen, Denmark, May 20–23, 2019, Proceedings
Book SynopsisThis book constitutes the proceedings of the 32nd International Conference on Architecture of Computing Systems, ARCS 2019, held in Copenhagen, Denmark, in May 2019. The 24 full papers presented in this volume were carefully reviewed and selected from 40 submissions. ARCS has always been a conference attracting leading-edge research outcomes in Computer Architecture and Operating Systems, including a wide spectrum of topics ranging from embedded and real-time systems all the way to large-scale and parallel systems. The selected papers are organized in the following topical sections: Dependable systems; real-time systems; special applications; architecture; memory hierarchy; FPGA; energy awareness; NoC/SoC. The chapter 'MEMPower: Data-Aware GPU Memory Power Model' is open access under a CC BY 4.0 license at link.springer.com.Table of ContentsDependable Systems.- Hardware/Software Co-designed Security Extensions for Embedded Devices.- SDES - Scalable Software Support for Dependable Embedded Systems.- Real-Time Systems.- Asynchronous Critical Sections in Real-Time Multiprocessor Systems.- Resource-Aware Parameter Tuning for Real-Time Applications.- A Hybrid NoC Enabling Fail-Operational and Hard Real-Time Communication in MPSoC.- Special Applications.- DSL-based Acceleration of Automotive Environment Perception and Mapping Algorithms for embedded CPUs, GPUs, and FPGAs.- Applying the Concept of Artificial DNA and Hormone System to a Low-Performance Automotive Environment.- A Parallel Adaptive Swarm Search Framework for Solving Black-Box Optimization Problems.- Architecture.- Leros: the Return of the Accumulator Machine.- A Generic Functional Simulation of Heterogeneous Systems.- Evaluating Dynamic Task Scheduling in a Task-based Runtime System for Heterogeneous Architectures.- Dynamic Scheduling of Pipelined Functional Units in Coarse-Grained Reconfigurable Array Elements.- Memory Hierarchy.- CyPhOS { A Component-based Cache-Aware Multi-Core Operating System.- Investigation of L2-Cache interferences in a NXP QorIQ T4240 multicore processor.- MEMPower: Data-Aware GPU Memory Power Model.- FPGA.- Effective FPGA Architecture for General CRC.- Receive-Side Notification for Enhanced RDMA in FPGA Based Networks.- An Efficient FPGA Accelerator Design for Optimized CNNs using OpenCL.- Energy Awareness.- The Return of Power Gating: Smart Leakage Energy Reductions in Modern Out-of-Order Processor Architectures.- A Heterogeneous and Reconfigurable Embedded Architecture for Energy-efficient Execution of Convolutional Neural Networks.- An energy efficient embedded processor for hard real-time Java applications.- NoC/SoC.- A Minimal Network Interface for a Simple Network-on-Chip.- Network Coding in Networks-on-Chip with Lossy Links.- Application Specific Reconfigurable SoC Interconnection Network Architectures.
£49.49
Springer Nature Switzerland AG System Verilog Assertions and Functional Coverage: Guide to Language, Methodology and Applications
Book SynopsisThis book provides a hands-on, application-oriented guide to the language and methodology of both SystemVerilog Assertions and Functional Coverage. Readers will benefit from the step-by-step approach to learning language and methodology nuances of both SystemVerilog Assertions and Functional Coverage, which will enable them to uncover hidden and hard to find bugs, point directly to the source of the bug, provide for a clean and easy way to model complex timing checks and objectively answer the question ‘have we functionally verified everything’. Written by a professional end-user of ASIC/SoC/CPU and FPGA design and Verification, this book explains each concept with easy to understand examples, simulation logs and applications derived from real projects. Readers will be empowered to tackle the modeling of complex checkers for functional verification and exhaustive coverage models for functional coverage, thereby drastically reducing their time to design, debug and cover. This updated third edition addresses the latest functional set released in IEEE-1800 (2012) LRM, including numerous additional operators and features. Additionally, many of the Concurrent Assertions/Operators explanations are enhanced, with the addition of more examples and figures. · Covers in its entirety the latest IEEE-1800 2012 LRM syntax and semantics; · Covers both SystemVerilog Assertions and SystemVerilog Functional Coverage languages and methodologies; · Provides practical applications of the what, how and why of Assertion Based Verification and Functional Coverage methodologies; · Explains each concept in a step-by-step fashion and applies it to a practical real life example; · Includes 6 practical LABs that enable readers to put in practice the concepts explained in the book.Table of ContentsIntroduction.- System Verilog Assertions.- Immediate Assertions.- Concurrent Assertions – Basics (sequence, property, assert).- Sampled Value Functions $rose, $fell.- Operators.- System Functions and Tasks.- Multiple clocks.- Local Variables.- Recursive property.- Detecting and using endpoint of a sequence.- ‘expect’.- ‘assume’ and formal (static functional) verification.- Other important topics.- Asynchronous Assertions !!!.- IEEE-1800–2009 Features.- SystemVerilog Assertions LABs.- System Verilog Assertions – LAB Answers.- Functional Coverage.- Performance Implications of coverage methodology.- Coverage Options.
£66.49
Springer Nature Switzerland AG Sequential and Parallel Algorithms and Data
Book SynopsisThis textbook is a concise introduction to the basic toolbox of structures that allow efficient organization and retrieval of data, key algorithms for problems on graphs, and generic techniques for modeling, understanding, and solving algorithmic problems. The authors aim for a balance between simplicity and efficiency, between theory and practice, and between classical results and the forefront of research. Individual chapters cover arrays and linked lists, hash tables and associative arrays, sorting and selection, priority queues, sorted sequences, graph representation, graph traversal, shortest paths, minimum spanning trees, optimization, collective communication and computation, and load balancing. The authors also discuss important issues such as algorithm engineering, memory hierarchies, algorithm libraries, and certifying algorithms. Moving beyond the sequential algorithms and data structures of the earlier related title, this book takes into account the paradigm shift towards the parallel processing required to solve modern performance-critical applications and how this impacts on the teaching of algorithms. The book is suitable for undergraduate and graduate students and professionals familiar with programming and basic mathematical language. Most chapters have the same basic structure: the authors discuss a problem as it occurs in a real-life situation, they illustrate the most important applications, and then they introduce simple solutions as informally as possible and as formally as necessary so the reader really understands the issues at hand. As they move to more advanced and optional issues, their approach gradually leads to a more mathematical treatment, including theorems and proofs. The book includes many examples, pictures, informal explanations, and exercises, and the implementation notes introduce clean, efficient implementations in languages such as C++ and Java.Trade Review“The style of the book is accessible and is suitable for a wide range of audiences, from mathematicians and computer scientists to researchers from other fields who would like to use parallelised approaches in their research.” (Irina Ioana Mohorianu, zbMATH 1445.68003, 2020)Table of ContentsAppetizer: Integer Arithmetic.- Introduction.- Representing Sequences by Arrays and Linked Lists.- Hash Tables and Associative Arrays.- Sorting and Selection.- Priority Queues.- Sorted Sequences.- Graph Representation.- Graph Traversal.- Shortest Paths.- Minimum Spanning Trees.- Generic Approaches to Optimization.- Collective Communication and Computation.- Load Balancing.- App. A, Mathematical Background.- App. B, Computer Architecture Aspects.- App. C, Support for Parallelism in C++.- App. D, The Message Passing Interface (MPI).- App. E, List of Commercial Products, Trademarks and Licenses.
£39.99
Springer Nature Switzerland AG Software Architecture: 13th European Conference, ECSA 2019, Paris, France, September 9–13, 2019, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 13th European Conference on Software Architecture, ECSA 2019, held in Paris, France, in September 2019. In the Research Track, 11 full papers presented together with 4 short papers were carefully reviewed and selected from 63 submissions. They are organized in topical sections as follows: Services and Micro-services, Software Architecture in Development Process, Adaptation and Design Space Exploration, and Quality Attributes. In the Industrial Track, 6 submissions were received and 3 were accepted to form part of these proceedings. Table of ContentsServices and Micro-services.- Guiding Architectural Decision Making on Service Mesh Based Microservice Architectures.- Supporting Architectural Decision Making on Data Management in Microservice Architectures.- From a Monolith to a Microservices Architecture: An Approach Based on Transactional Contexts.- Software Architecture in Development Process.- An Exploratory Study of Naturalistic Decision Making in Complex Software Architecture Environments.- Evaluating the Effectiveness of Multi-level Greedy Modularity Clustering for Software Architecture Recovery.- What Quality Attributes Can we Find in Product Backlogs? A Machine Learning Perspective.- Architecturing Elastic Edge Storage Services for Data-Driven Decision Making.- Adaptation and Design Space Exploration.- Continuous Adaptation Management in Collective Intelligence Systems.- ADOOPLA – Product-Line- and Product-Level PLA Optimization.- Assessing Adaptability of Software Architectures for Cyber Physical Production Systems.- Quality Attributes.- Optimising Architectures for Performance, Cost, and Security.- QoS-based Formation of Software Architectures in the Internet of Things.- A Survey on Big Data Analytics Solutions Deployment.- Assessing the Quality Impact of Features in Component-based Software Architectures.- Components and Design Alternatives in E-Assessment Systems.- Industry track.- A Four-Layer Architecture Pattern for Constructing and Managing Digital Twins.- Tool Support for the Migration to Microservice Architecture: An Industrial Case Study.- ACE: Easy Deployment of Field Optimization Experiments.
£44.99
Springer Nature Switzerland AG Intelligent Internet of Things: From Device to Fog and Cloud
Book SynopsisThis holistic book is an invaluable reference for addressing various practical challenges in architecting and engineering Intelligent IoT and eHealth solutions for industry practitioners, academic and researchers, as well as for engineers involved in product development. The first part provides a comprehensive guide to fundamentals, applications, challenges, technical and economic benefits, and promises of the Internet of Things using examples of real-world applications. It also addresses all important aspects of designing and engineering cutting-edge IoT solutions using a cross-layer approach from device to fog, and cloud covering standards, protocols, design principles, reference architectures, as well as all the underlying technologies, pillars, and components such as embedded systems, network, cloud computing, data storage, data processing, big data analytics, machine learning, distributed ledger technologies, and security. In addition, it discusses the effects of Intelligent IoT, which are reflected in new business models and digital transformation. The second part provides an insightful guide to the design and deployment of IoT solutions for smart healthcare as one of the most important applications of IoT. Therefore, the second part targets smart healthcare-wearable sensors, body area sensors, advanced pervasive healthcare systems, and big data analytics that are aimed at providing connected health interventions to individuals for healthier lifestyles.Table of ContentsIntroduction.- Engineering an AI-driven IoT platform.- Smart and connected IoT devices.- Engineering IoT networks.- IoT cloud architecture and design.- End-to-end security.- Machine learning fundamentals.- Big Data and advanced analytics.- AI-driven IoT for smart health.- Biomedical engineering fundamentals.- Biosensors and connected wearable eHealth devices.- Applications of machine learning & IoT in healthcare.- AI-driven IoT eHealth prototyping lab.- Conclusion.
£66.49
Springer Nature Switzerland AG How Transistor Area Shrank by 1 Million Fold
Book SynopsisThis book explains in layman’s terms how CMOS transistors work. The author explains step-by-step how CMOS transistors are built, along with an explanation of the purpose of each process step. He describes for readers the key inventions and developments in science and engineering that overcame huge obstacles, enabling engineers to shrink transistor area by over 1 million fold and build billions of transistor switches that switch over a billion times a second, all on a piece of silicon smaller than a thumbnail.Table of ContentsIntroduction.- Overview.- Semiconductors and Insulators.- Diodes, MOS Transistors, Bipolar Transistors, Inverters.- Building High Performance MOS Transistors.- Parasitic MOS and Bipolar Transistors.- Design Rules and Photo Patterns.- CMOS Inverter Process Flow.- Key Inventions & Developments that Enabled Scaling.- Process Flow with Histories of Scaling at Key Steps.
£37.99
Springer Nature Switzerland AG Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405
Book SynopsisThis open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019.Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first. Table of ContentsFoundations of Reversible Computation.- Software and Reversible Systems: A Survey of Recent Activities.- Simulation and Design of Quantum Circuits.- Research on Reversible Functions Having Component Functions with Specified Properties - An Overview.- A Case Study for Reversible Computing: Reversible Debugging.- Towards Choreographic-Based Monitoring.- Reversibility in Chemical Reactions.- Reversible Control of Robots.- Reversible Languages and Incremental State Saving in Optimistic Parallel Discrete Event Simulation.- Reversible Computation in Wireless Communications.- Error Reconciliation in Quantum Key Distribution Protocols.
£34.99
Springer Nature Switzerland AG Embedded System Design: Embedded Systems
Book SynopsisA unique feature of this open access textbook is to provide a comprehensive introduction to the fundamental knowledge in embedded systems, with applications in cyber-physical systems and the Internet of things. It starts with an introduction to the field and a survey of specification models and languages for embedded and cyber-physical systems. It provides a brief overview of hardware devices used for such systems and presents the essentials of system software for embedded systems, including real-time operating systems. The author also discusses evaluation and validation techniques for embedded systems and provides an overview of techniques for mapping applications to execution platforms, including multi-core platforms. Embedded systems have to operate under tight constraints and, hence, the book also contains a selected set of optimization techniques, including software optimization techniques. The book closes with a brief survey on testing. This fourth edition has been updated and revised to reflect new trends and technologies, such as the importance of cyber-physical systems (CPS) and the Internet of things (IoT), the evolution of single-core processors to multi-core processors, and the increased importance of energy efficiency and thermal issues.Table of ContentsChapter 1. Introduction.- Chapter 2. Specifications and Modeling.- Chapter 3. Embedded System Hardware.- Chapter 4. System Software.- Chapter 5. Evaluation and Validation.- Chapter 6. Application Mapping.- Chapter 7. Optimization.- Chapter 8. Test.
£42.74
Springer Nature Switzerland AG Introduction to Computation: Haskell, Logic and
Book SynopsisComputation, itself a form of calculation, incorporates steps that include arithmetical and non-arithmetical (logical) steps following a specific set of rules (an algorithm). This uniquely accessible textbook introduces students using a very distinctive approach, quite rapidly leading them into essential topics with sufficient depth, yet in a highly intuitive manner. From core elements like sets, types, Venn diagrams and logic, to patterns of reasoning, calculus, recursion and expression trees, the book spans the breadth of key concepts and methods that will enable students to readily progress with their studies in Computer Science.Trade Review“This book is intended as a textbook for an introductory course in computation for students beginning in informatics. No prerequisites are needed, all concepts, even elementary ones ... . it is also very suited for self-study, even if a reader is interested in Haskell or symbolic logic alone. ... Comprehension is supported by exercises for each chapter ... .” (Dieter Riebesehl, zbMATH 1497.68005, 2022)Table of Contents1 Sets 132 Types 193 Simple Computations 274 Venn Diagrams and Logical Connectives 355 Lists and Comprehensions 456 Features and Predicates 557 Testing Your Programs 638 Patterns of Reasoning 739 More Patterns of Reasoning 8110 Lists and Recursion 9111 More Fun with Recursion 10112 Higher-Order Functions 11113 Higher and Higher 12314 Sequent Calculus 13115 Algebraic Data Types 14316 Expression Trees 15717 Karnaugh Maps 17518 Relations and Quantifiers 18319 Checking Satisfiability 19120 Data Representation 20321 Data Abstraction 22122 Efficient CNF Conversion 23723 Counting Satisfying Valuations 24924 Type Classes 26325 Search in Trees 27526 Combinatorial Algorithms 28527 Finite Automata 29928 Deterministic Finite Automata 31129 Non-Deterministic Finite Automata 32130 Input/Output and Monads 34131 Regular Expressions 35932 Non-Regular Languages 369Index 377
£28.49