Digital Design and Computer Architecture, Second Edition, takes a unique and modern approach to digital design, introducing the reader to the fundamentals of digital logic and then showing step by step how to build a MIPS microprocessor in both Verilog and VHDL.
CUDA for Engineers gives you direct, hands-on engagement with personal, high-performance parallel computing, enabling you to do computations on a gaming-level PC that would have required a supercomputer just a few years ago.
Networks-on-Chip: From Implementations to Programming Paradigms provides a thorough and bottom-up exploration of the whole NoC design space in a coherent and uniform fashion, from low-level router, buffer and topology implementations, to routing and flow control schemes, to co-optimizations of NoC and high-level programming paradigms.
Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure.
As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary.
Hugo de Man Professor Katholieke Universiteit Leuven Senior Research Fellow IMEC The steady evolution of hardware, software and communications technology is rapidly transforming the PC- and dot.
Dynamic Reconfiguration: Architectures and Algorithms offers a comprehensive treatment of dynamically reconfigurable computer architectures and algorithms for them.
Replication Techniques in Distributed Systems organizes and surveys the spectrum of replication protocols and systems that achieve high availability by replicating entities in failure-prone distributed computing environments.
This book introduces the fundamental concepts and practical simulation te- niques for modeling different aspects of operating systems to study their g- eral behavior and their performance.
High Performance Computing Systems and Applications contains the fully refereed papers from the 13th Annual Symposium on High Performance Computing, held in Kingston, Canada, in June 1999.
High Performance Data Mining: Scaling Algorithms, Applications and Systems brings together in one place important contributions and up-to-date research results in this fast moving area.
FORTE 2001, formerly FORTE/PSTV conference, is a combined conference of FORTE (Formal Description Techniques for Distributed Systems and Communication Protocols) and PSTV (Protocol Specification, Testing and Verification) conferences.
Distributed applications are a necessity in most central application sectors of the contemporary information society, including e-commerce, e-banking, e-learning, e-health, telecommunication and transportation.
Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place.
This book explores the intersection of legal frameworks, healthcare innovation, and computational intelligence, shedding light on how emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping the medical landscape.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
AI-Enabled Threat Intelligence and Cyber Risk Assessment delves into the transformative potential of artificial intelligence (AI) in revolutionizing cybersecurity, offering a comprehensive exploration of current trends, challenges, and future possibilities in mitigating cyber risks.
With data and AI increasingly at the forefront of business today, you have a significant advantage when you can manage data, and uncover and communicate data insights effectively.
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
Master identity solutions and strategies and prepare to achieve Microsoft Identity and Access Administrator SC-300 certificationPurchase of this book unlocks access to web-based exam prep resources such as mock exams, flashcards, and exam tipsKey FeaturesGain invaluable insights into SC-300 certification content from industry expertsStrengthen your foundations and master all crucial concepts required for exam successRigorous mock exams reflect the real exam environment, boosting your confidence and readinessPurchase of this book unlocks access to web-based exam prep resources including mock exams, flashcards, exam tipsBook DescriptionSC-300 exam content has undergone significant changes, and this second edition aligns with the revised exam objectives.
The purpose of this book is to avail students of the many different reasons and back-stories equated with the advent of interaction design and its effect on our world.
Discover how project Reactor enhances the reactive programming paradigm and allows you to build scalable asynchronous applicationsKey FeaturesUse reactive APIs, Flux, and Mono to implement reactive extensionsCreate concurrent applications without the complexity of Java's concurrent APIUnderstand techniques to implement event-driven and reactive applicationsBook DescriptionReactor is an implementation of the Java 9 Reactive Streams specification, an API for asynchronous data processing.
This book describes how a computer works and explains how the various hardware components are organized and interconnected to provide a platform upon which programs can be executed.
The modern application server is a complex platform that is the linchpin of an enterprise environment that includes a very wide range of technologies-web document formatting, web protocols, server-side scripts, servlets, applets, programming languages, distributed object technologies, security capabilities, directory and naming services, load balan
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts.
The authors of Practical Network Design Techniques, Second Edition: A Complete Guide for WANs and LANs build upon the popular first edition by combining pre-existing network design fundamentals with new material on LAN devices and topologies, wireless local networks, and LAN internetworking issues.
The Practical Handbook of Internet Computing analyzes a broad array of technologies and concerns related to the Internet, including corporate intranets.
Because they provide practical machine-to-machine communication at a very low cost, the popularity of wireless sensor networks is expected to skyrocket in the next few years, duplicating the recent explosion of wireless LANs.
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server downtime.
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape.
Enhancing LAN Performance, Fourth Edition explains how to connect geographically separated LANs with appropriate bandwidth, the issues to consider when weighing the use of multiport or dualport devices, how to estimate traffic for new networks, the effects of configuration changes on the performance of Ethernet and Token Ring networks, the design o
System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services.
This book, Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics, is a comprehensive guide that explores the intricate world of digital security and forensics.
Consisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols.