Summary Programmer's Guide to Apache Thrift provides comprehensive coverage of the Apache Thrift framework along with a developer's-eye view of modern distributed application architecture.
With the end of Dennard scaling and Moore's law, IC chips, especially large-scale ones, now face more reliability challenges, and reliability has become one of the mainstay merits of VLSI designs.
This book gives a detailed overview of a universal Maximum Likelihood (ML) decoding technique, known as Guessing Random Additive Noise Decoding (GRAND), has been introduced for short-length and high-rate linear block codes.
The three-volume set LNCS 14801, 14802, and 14803 constitutes the proceedings of the 30th European Conference on Parallel and Distributed Processing, Euro-Par 2024, which took place in Madrid, Spain, during August 26-30, 2024.
Towards Unmanned Surface Vehicles: Methods and Practices presents the latest overview, methodologies, design practices, and applications of unmanned surface vehicles (USVs).
Digital Strategy and Governance in Transformative Technologies offers a comprehensive exploration of how emerging technologies are reshaping business operations, governance structures, and societal interactions.
We are living in the digital age: from ordering products & services to studying and booking travel, digital solutions are everywhere we go and in everything we do.
There is a need to categorize artificial intelligence (AI) applications, tools, techniques, and algorithms based on their intended use in various design stages.
Go beyond C by applying modern C++ in embedded systems to enhance code readability, maintainability, and scalabilityKey FeaturesBridge the gap between C and modern C++ for embedded systems through practical examplesLearn how to save memory and cut down on runtime computing using compile-time computation techniquesImprove your software design skills by applying patterns to solve common problems in embedded systems using C++Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionTransitioning from C can be daunting, with concerns about performance overhead, added complexity, and unfamiliar tooling.
Explore reverse engineering in Armv8-A-based Arm devices, develop the skills to analyze binaries, and leverage cutting-edge security hardening features through hands-on techniques and expert insightsKey FeaturesMaster key aspects of Armv8-A, including register, exception handling, and TrustZoneBuild new reversing skills for kernel binaries, such as *.