Responsive Computer Systems: Steps Towards Fault-Tolerant Real-Time Systems provides an extensive treatment of the most important issues in the design of modern Responsive Computer Systems.
This book gives a solution to the problem of constructing lightwave paths in free spaces by proposing the concept of a Self-Organized Lightwave Network (SOLNET).
Chapters in Fast Simulation of Computer Architectures cover topics such as how to collect traces, emulate instruction sets, simulate microprocessors using execution-driven techniques, evaluate memory hierarchies, apply statistical sampling to simulation, and how to augment simulation with performance bound models.
Smart Sensor Networks (WSNs) using AI have left a mark on the lives of all by aiding in various sectors, such as manufacturing, education, healthcare, and monitoring of the environment and industries.
This book describes novel hardware security and microfluidic biochip design methodologies to protect against tampering attacks in cyberphysical microfluidic biochips (CPMBs).
The book comprises a new method of solving the integral equation of Leontovich, the most rigorous and most effective equation for the current in thin linear antennas.
This book introduces the technical foundations and tools for estimating the power consumption of internet networks and services, including a detailed description of how these models are constructed and applied.
A hands-on guide to writing a Message Passing Interface, this book takes the reader on a tour across major MPI implementations, best optimization techniques, application relevant usage hints, and a historical retrospective of the MPI world, all based on a quarter of a century spent inside MPI.
The hybrid/heterogeneous nature of future microprocessors and large high-performance computing systems will result in a reliance on two major types of components: multicore/manycore central processing units and special purpose hardware/massively parallel accelerators.
The five-volume set LNCS 11536, 11537, 11538, 11539 and 11540 constitutes the proceedings of the 19th International Conference on Computational Science, ICCS 2019, held in Faro, Portugal, in June 2019.
Blockchain and distributed ledger technology (DLT) have been identified as emerging technologies that can enhance global supply chain management processes.
Governmental agencies and private companies of different countries are actively moving into space around Earth with the aim to provide smart communication and industry, security, and defense solutions.
This book is intended for senior undergraduate and graduate students as well as practicing engineers who are involved in design and analysis of radio frequency (RF) circuits.
In this book, we are concerned with studying the co-design methodology, in general, and how to determine the more suitable interface mechanism in a co-design system, in particular.
This book examines computer architecture, computability theory, and the history of computers from the perspective of minimalist computing - a framework in which the instruction set consists of a single instruction.
Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview of wireless network spectrum sharing in seven distinct sections: The first section examines the big picture and basic principles, explaining the concepts of spectrum sharing, hardware/software function requirements for efficient sharing, and future trends of sharing strategies.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment.
Smart Applications of Artificial Intelligence and Big Data covers a wide range of topics related to AI and big data, including machine learning, deep learning, natural language processing, computer vision, data analytics, and data mining.
In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs).
Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises a great practical award.
Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications.
Enterprise Fortress is a comprehensive guide to building secure and resilient enterprise architectures, aimed at professionals navigating the complex world of cybersecurity.
Far from being the passive containers for semiconductor devices of the past, the packages in today's high performance computers pose numerous challenges in interconnecting, powering, cooling and protecting devices.
As venture capital and industrial resources are increasingly poured into rapid advances in artificial intelligence, the actual usage and success of AI depends on a satisfactory experience for the user.
A problem/solution manual, integrating general principles and laboratory exercises, that provides students with the hands-on experience needed to master the basics of modern computer system designFeatures more than 200 detailed problems, with step-by-step solutions; many detailed graphics and charts; chapter summaries with additional "e;rapid-review"e; questions; and expert sidebar tipsDescribes analytical methods for quantifying real-world design choices regarding instruction sets, pipelining, cache, memory, I/O, and other critical hardware and software elements involved in building computersAn ideal educational resource for the more than 70,000 undergraduate and graduate students who, each year, enroll in computer architecture and related courses
Thinking Machines: Machine Learning and Its Hardware Implementation covers the theory and application of machine learning, neuromorphic computing and neural networks.
The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications.
This book comprehensively discusses nature-inspired algorithms, deep learning methods, applications of mathematical programming and artificial intelligence techniques.
Today, relevant data are typically delivered to cloud-based servers for storing and analysis in order to extract key features and enable enhanced applications beyond the basic transmission of raw data and to realize the possibilities associated with the impending Internet of Things (IoT).
The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.
With the massive and pervasive diffusion of robotics technology in our society, we are heading towards a new type of AI, which we call Physical AI at the intersection of Robotics with AI, that is the science of robots and intelligent machines performing a physical action to help humans in their jobs of daily lives.
Gain actionable insights from qualitative remote studies to improve user experienceKey FeaturesUnderstand the different usability testing methodologies and their strengths and weaknessesMaster the execution of remote studiesLearn how to analyze and present study resultsBook DescriptionUsability testing is a subdiscipline of User Experience.
This edited volume brings together diverse perspectives on machine learning and AI applications in optical and wireless systems, offering a structured and comprehensive resource for researchers and professionals.