Modern computing relies on future and emergent technologies which have been conceived via interaction between computer science, engineering, chemistry, physics and biology.
The Future of Numerical ComputingWritten by one of the foremost experts in high-performance computing and the inventor of Gustafson's Law, The End of Error: Unum Computing explains a new approach to computer arithmetic: the universal number (unum).
With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology.
Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications.
This book provides a dual perspective on the Internet of Things and ubiquitous computing, along with their applications in healthcare and smart cities.
This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization.
The advances in low-power electronic devices integrated with wireless communication capabilities are one of recent areas of research in the field of Wireless Sensor Networks (WSNs).
High-Performance Computing for Big Data: Methodologies and Applications explores emerging high-performance architectures for data-intensive applications, novel efficient analytical strategies to boost data processing, and cutting-edge applications in diverse fields, such as machine learning, life science, neural networks, and neuromorphic engineering.
With the ubiquitous diffusion of the IoT, Cloud Computing, 5G and other evolved wireless technologies into our daily lives, the world will see the Internet of the future expand ever more quickly.
Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale.
This practical book presents fundamental concepts and issues in computer modeling and simulation (M&S) in a simple and practical way for engineers, scientists, and managers who wish to apply simulation successfully to their real-world problems.
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages.
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks.
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks.
Developed by the leading scientists in the field, Designing for Situation Awareness: An Approach to User-Centered Design, Third Edition offers a systematic and successful methodology for supporting the situation awareness (SA) of individuals and teams who work in complex and demanding environments.
Experts from Andersen Consulting show you how to combine computing, communications, and knowledge to deliver a uniquely new-and entirely indispensable-competitive advantage.
Experts from Andersen Consulting show you how to combine computing, communications, and knowledge to deliver a uniquely new-and entirely indispensable-competitive advantage.
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks.
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks.
To avoid serious bottlenecks, components of the Internet and of intranets-such as servers, browsers, and the access networks-must be properly designed, implemented, managed, and monitored.
To avoid serious bottlenecks, components of the Internet and of intranets-such as servers, browsers, and the access networks-must be properly designed, implemented, managed, and monitored.
In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems.
In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.
The book aims to enable the reader to master the engineering of communication protocols, which are amply present nowadays in mobile phones, tablets, laptops, smart appliances, and service providers' datacenters and clouds.
The book aims to enable the reader to master the engineering of communication protocols, which are amply present nowadays in mobile phones, tablets, laptops, smart appliances, and service providers' datacenters and clouds.
This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system.