Distributed Object Computing teaches readers the fundamentals of CORBA, the leading architecture for design of software used in parallel and distributed computing applications.
A survey of microwave technology tailored for professionals in wireless communications RF Technologies for Low Power Wireless Communications updates recent developments in wireless communications from a hardware design standpoint and offers specialized coverage of microwave technology with a focus on the low power wireless units required in modern wireless systems.
New approaches to parallel computing are being developed that make better use of the heterogeneous cluster architecture Provides a detailed introduction to parallel computing on heterogenous clusters All concepts and algorithms are illustrated with working programs that can be compiled and executed on any cluster The algorithms discussed have practical applications in a range of real-life parallel computing problems, such as the N-body problem, portfolio management, and the modeling of oil extraction
The first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals.
A practical, nuts-and-bolts guide to architectural solutions that describes step-by-step how to design robustness and flexibility into an Internet-based system Based on real-world problems and systems, and illustrated with a running case study Enables software architects and project managers to ensure that nonfunctional requirements are met so that the system won't fall over, that it can be maintained and upgraded without being switched off, and that it can deal with security, scalability, and performance demands Platform and vendor independence will empower architects to challenge product-dictated limitations
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel database processing within a major database management system (DBMS).
This text provides an excellent balance of theory and application that enables you to deploy powerful algorithms, frameworks, and methodologies to solve complex optimization problems in a diverse range of industries.
The possibility of direct interfacing between biological and technological information devices could result in a merger of mind and machine - Ultimate Computing.
CCITT (now ITU-T) Specification and Description Language (SDL) and systems engineering (formal and informal) in SDL are considered in this publication.
Changes in size and power of available mining transport equipment, combined with improved means of control involving leaky feeder radio and computers, demands a new look at the problem of mine winding and transport.
The International Web Content Caching and Distribution Workshop (WCW) is a premiere technical meeting for researchers and practitioners interested in all aspects of content caching, distribution and delivery on the Internet.
The book addresses the need to investigate new approaches to lower energy requirement in multiple application areas and serves as a guide into emerging circuit technologies.
The book addresses the need to investigate new approaches to lower energy requirement in multiple application areas and serves as a guide into emerging circuit technologies.
This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15.
This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15.
Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone.
Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone.
The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what services the Internet offers.
The Internet Book, Fifth Edition explains how computers communicate, what the Internet is, how the Internet works, and what services the Internet offers.
The richly illustrated Interactive Web-Based Data Visualization with R, plotly, and shiny focuses on the process of programming interactive web graphics for multidimensional data analysis.
The richly illustrated Interactive Web-Based Data Visualization with R, plotly, and shiny focuses on the process of programming interactive web graphics for multidimensional data analysis.
Numerous people still believe that learning and acquiring expertise in Linux is not easy, that only a professional can understand how a Linux system works.
Numerous people still believe that learning and acquiring expertise in Linux is not easy, that only a professional can understand how a Linux system works.
Speech and audio processing has undergone a revolution in preceding decades that has accelerated in the last few years generating game-changing technologies such as truly successful speech recognition systems; a goal that had remained out of reach until very recently.
Speech and audio processing has undergone a revolution in preceding decades that has accelerated in the last few years generating game-changing technologies such as truly successful speech recognition systems; a goal that had remained out of reach until very recently.
This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive security control of the networked control systems.
This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, quantify the impact of the Denial-of-Service attacks on the optimal control system, and the adaptive security control of the networked control systems.
This book focuses on the suitable methods to solve optimization problems in wireless network system utilizing digital sensors like Wireless Sensor Network.
This book focuses on the suitable methods to solve optimization problems in wireless network system utilizing digital sensors like Wireless Sensor Network.