Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
It is always a special honor to chair the European Dependable Computing C- ference (EDCC). EDCC has become one of the well-established conferences in the ?eld of dependability in the European research area. Budapest was selected as the host of this conference due to its traditions in organizing international scienti?c events and its traditional role of serving as a meeting point between East and West. EDCC-5 was the ?fth in the series of these high-quality scienti?c conf- ences. In addition to the overall signi?cance of such a pan-European event, this year's conference was a special one due to historic reasons. The roots of EDCC date back to the moment when the Iron Curtain fell. Originally, two groups of scientists from di?erent European countries in Western and Eastern Europe - who were active in research and education related to dependability created a - joint forum in order to merge their communities as early as in 1989. This trend has continued up to today. This year's conference was the ?rst one where the overwhelming majority of the research groups belong to the family of European nations united in the European Union. During the past 16 years we observed that the same roots in all the professional, cultural and scienti?c senses led to a seamless integration of these research communities previously separated ar- ?cially for a long time. EDCC has become one of the main European platforms to exchange new - searchideasinthe?eldofdependability.
Choose an application
Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be much broader than that of scientific computing, up to now the main application area for parallel computing. Rauber and Rünger take up these recent developments in processor architecture by giving detailed descriptions of parallel programming techniques that are necessary for developing efficient programs for multicore processors as well as for parallel cluster systems and supercomputers. Their book is structured in three main parts, covering all areas of parallel computing: the architecture of parallel systems, parallel programming models and environments, and the implementation of efficient application algorithms. The emphasis lies on parallel programming techniques needed for different architectures. The main goal of the book is to present parallel programming techniques that can be used in many situations for many application areas and which enable the reader to develop correct and efficient parallel programs. Many examples and exercises are provided to show how to apply the techniques. The book can be used as both a textbook for students and a reference book for professionals. The presented material has been used for courses in parallel programming at different universities for many years.
Computer Science. --- Programming Techniques. --- Computer Communication Networks. --- Computational Science and Engineering. --- System Performance and Evaluation. --- Processor Architectures. --- Communications Engineering, Networks. --- Computer science. --- Computer system performance. --- Telecommunication. --- Informatique --- Réseaux d'ordinateurs --- Télécommunications --- Programmation parallèle (informatique) --- Parallel programming (Computer science)
Choose an application
The SAMOS workshop is an international gathering of highly quali?ed researchers from academia and industry, sharing in a 3-day lively discussion on the quiet and - spiring northern mountainside of the Mediterranean island of Samos. As a tradition, the workshop features workshop presentations in the morning, while after lunch all kinds of informal discussions and nut-cracking gatherings take place. The workshop is unique in the sense that not only solved research problems are presented and discussed but also (partly) unsolved problems and in-depth topical reviews can be unleashed in the sci- ti?c arena. Consequently, the workshop provides the participants with an environment where collaboration rather than competition is fostered. The earlier workshops, SAMOS I-IV (2001-2004), were composed only of invited presentations. Due to increasing expressions of interest in the workshop, the Program Committee of SAMOS V decided to open the workshop for all submissions. As a result the SAMOS workshop gained an immediate popularity; a total of 114 submitted papers were received for evaluation. The papers came from 24 countries and regions: Austria (1), Belgium (2), Brazil (5), Canada (4), China (12), Cyprus (2), Czech Republic (1), Finland (15), France (6), Germany (8), Greece (5), Hong Kong (2), India (2), Iran (1), Korea (24), The Netherlands (7), Pakistan (1), Poland (2), Spain (2), Sweden (2), T- wan (1), Turkey (2), UK (2), and USA (5). We are grateful to all of the authors who submitted papers to the workshop.
Computers. --- Computer hardware. --- Microprocessors. --- Computer communication systems. --- Computer system failures. --- Architecture, Computer. --- Theory of Computation. --- Computer Hardware. --- Processor Architectures. --- Computer Communication Networks. --- System Performance and Evaluation. --- Computer System Implementation.
Choose an application
This graduate-level textbook is ideally suited for lecturing the most relevant topics of Edge Computing and its ties to Artificial Intelligence (AI) and Machine Learning (ML) approaches. It starts from basics and gradually advances, step-by-step, to ways AI/ML concepts can help or benefit from Edge Computing platforms. The book is structured into seven chapters; each comes with its own dedicated set of teaching materials (practical skills, demonstration videos, questions, lab assignments, etc.). Chapter 1 opens the book and comprehensively introduces the concept of distributed computing continuum systems that led to the creation of Edge Computing. Chapter 2 motivates the use of container technologies and how they are used to implement programmable edge computing platforms. Chapter 3 introduces ways to employ AI/ML approaches to optimize service lifecycles at the edge. Chapter 4 goes deeper in the use of AI/ML and introduces ways to optimize spreading computational tasks along edge computing platforms. Chapter 5 introduces AI/ML pipelines to efficiently process generated data on the edge. Chapter 6 introduces ways to implement AI/ML systems on the edge and ways to deal with their training and inferencing procedures considering the limited resources available at the edge-nodes. Chapter 7 motivates the creation of a new orchestrator independent object model to descriptive objects (nodes, applications, etc.) and requirements (SLAs) for underlying edge platforms. To provide hands-on experience to students and step-by-step improve their technical capabilities, seven sets of Tutorials-and-Labs (TaLs) are also designed. Codes and Instructions for each TaL is provided on the book website, and accompanied by videos to facilitate their learning process.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- software engineering --- computernetwerken --- Computer networks. --- Software engineering. --- Machine learning. --- Electronic digital computers—Evaluation. --- Computer Communication Networks. --- Software Engineering. --- Machine Learning. --- System Performance and Evaluation.
Choose an application
This updated edition offers an indispensable exposition on real-time computing, with particular emphasis on predictable scheduling algorithms. It introduces the fundamental concepts of real-time computing, demonstrates the most significant results in the field, and provides the essential methodologies for designing predictable computing systems used to support time-critical control applications. Along with an in-depth guide to the available approaches for the implementation and analysis of real-time applications, this revised edition contains a close examination of recent developments in real-time systems, including limited preemptive scheduling, resource reservation techniques, overload handling algorithms, and adaptive scheduling techniques. This volume serves as a fundamental advanced-level textbook. Each chapter provides basic concepts, which are followed by algorithms, illustrated with concrete examples, figures and tables. Exercises and solutions are provided to enhance self-study, making this an excellent reference for those interested in real-time computing for designing and/or developing predictable control applications.
Electrical engineering --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbesturingssystemen --- software engineering --- computernetwerken --- architectuur (informatica) --- elektrische circuits --- Computer Science. --- Special Purpose and Application-Based Systems. --- Circuits and Systems. --- System Performance and Evaluation. --- Computer Communication Networks. --- Processor Architectures. --- Computer science. --- Computer networks --- Software engineering. --- Systems engineering. --- Informatique --- Réseaux d'ordinateurs --- Génie logiciel --- Ingénierie des systèmes --- EPUB-LIV-FT LIVINFOR SPRINGER-B
Choose an application
"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract concepts accessible for a wide audience." Janos Sztipanovits, Director E. Bronson Ingram Distinguished Professor of Engineering Institute for Software Integrated Systems Vanderbilt University Real-Time Systems focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the Second Edition, new developments in communication standards for time-sensitive networks, such as TSN and Time-Triggered Ethernet are addressed. Furthermore, this edition includes a new chapter on real-time aspects in cloud and fog computing. The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike.
Embedded computer systems. --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- Cooperating objects (Computer systems). --- Computers, Special purpose. --- Operating systems (Computers). --- Electronic digital computers --- Cyber-Physical Systems. --- Embedded Systems. --- Special Purpose and Application-Based Systems. --- Operating Systems. --- System Performance and Evaluation. --- Evaluation. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Special purpose computers --- Operating systems
Choose an application
It is the combination of mathematical ideas and efficient programs that drives the progress in many scientific disciplines: The faster results can be generated on a computer, the bigger and the more accurate are the challenges that can be solved. This textbook targets students who have programming skills and do not shy away from mathematics, though they might be educated in computer science or an application domain and have no primary interest in the maths. The book is for students who want to see some simulations up and running. It introduces the basic concepts and ideas behind applied mathematics and parallel programming that are needed to write numerical simulations for today’s multicore workstations. The intention is not to dive into one particular application domain or to introduce a new programming language; rather it is to lay the generic foundations for future studies and projects in this field. Topics and features: Fits into many degrees where students have already been exposed to programming languages Pairs an introduction to mathematical concepts with an introduction to parallel programming Emphasises the paradigms and ideas behind code parallelisation, so students can later on transfer their knowledge and skills Illustrates fundamental numerical concepts, preparing students for more formal textbooks The easily digestible text prioritises clarity and intuition over formalism, illustrating basic ideas that are of relevance in various subdomains of scientific computing. Its primary goal is to make theoretical and paradigmatic ideas accessible and even fascinating to undergraduate students. Tobias Weinzierl is professor in the Department of Computer Science at Durham University, Durham, UK. He has worked at the Munich Centre for Advanced Computing (see the Springer edited book, Advanced Computing) before, and holds a PhD and habilitation from the Technical University Munich.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- computers --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- wiskunde --- informaticaonderzoek --- Computers. --- Computer programming. --- Electronic digital computers --- Mathematics --- Mathematics of Computing. --- Hardware Performance and Reliability. --- Programming Techniques. --- System Performance and Evaluation. --- Computational Science and Engineering. --- Mathematics. --- Evaluation. --- Data processing.
Choose an application
"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract concepts accessible for a wide audience." Janos Sztipanovits, Director E. Bronson Ingram Distinguished Professor of Engineering Institute for Software Integrated Systems Vanderbilt University Real-Time Systems focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the Second Edition, new developments in communication standards for time-sensitive networks, such as TSN and Time-Triggered Ethernet are addressed. Furthermore, this edition includes a new chapter on real-time aspects in cloud and fog computing. The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike.
Computer architecture. Operating systems --- Computer. Automation --- embedded systems --- informatica --- computerbesturingssystemen --- algoritmen --- OS (operating system) --- Cooperating objects (Computer systems). --- Embedded computer systems. --- Computers, Special purpose. --- Operating systems (Computers). --- Electronic digital computers --- Cyber-Physical Systems. --- Embedded Systems. --- Special Purpose and Application-Based Systems. --- Operating Systems. --- System Performance and Evaluation. --- Evaluation.
Choose an application
Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. High availability and disaster recovery are contributions of the IT to fulfill this requirement. And companies will be confronted with such demands to an even greater extent in the future, since their credit ratings will be lower without such precautions. Both, high availability and disaster recovery, are realized by redundant systems. Redundancy can and should be implemented on different abstraction levels: from the hardware, the operating system and middleware components up to the backup computing center in case of a disaster. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux systems.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- OS (operating system) --- Computer organization. --- Computer system failures. --- Special purpose computers. --- Software engineering. --- Operating systems (Computers). --- Computer Systems Organization and Communication Networks. --- System Performance and Evaluation. --- Special Purpose and Application-Based Systems. --- Software Engineering/Programming and Operating Systems. --- Operating Systems. --- Enginyeria de programari --- Sistemes operatius (Ordinadors) --- Tolerància als errors (Informàtica) --- Sistemes informàtics --- Dades --- Fallades --- Recuperació (Informàtica) --- Data recovery (Computer science) --- Electronic data processing --- Redundancy (Engineering) --- Backup processing alternatives.
Choose an application
The third edition of this authoritative and comprehensive handbook is the definitive work on the current state of the art of Biometric Presentation Attack Detection (PAD) – also known as Biometric Anti-Spoofing. Building on the success of the previous editions, this thoroughly updated third edition has been considerably revised to provide even greater coverage of PAD methods, spanning biometrics systems based on face, fingerprint, iris, voice, vein, and signature recognition. New material is also included on major PAD competitions, important databases for research, and on the impact of recent international legislation. Valuable insights are supplied by a selection of leading experts in the field, complete with results from reproducible research, supported by source code and further information available at an associated website. Topics and features: reviews the latest developments in PAD for fingerprint biometrics, covering recent technologies like Vision Transformers, and review of competition series; examines methods for PAD in iris recognition systems, the use of pupil size measurement or multiple spectra for this purpose; discusses advancements in PAD methods for face recognition-based biometrics, such as recent progress on detection of 3D facial masks and the use of multiple spectra with Deep Neural Networks; presents an analysis of PAD for automatic speaker recognition (ASV), including a study of the generalization to unseen attacks; describes the results yielded by key competitions on fingerprint liveness detection, iris liveness detection, and face anti-spoofing; provides analyses of PAD in finger-vein recognition, in signature biometrics, and in mobile biometrics; includes coverage of international standards in PAD and legal aspects of image manipulations like morphing.This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics. This text/reference is essential reading for anyone involved in biometric identity verification, be they students, researchers, practitioners, engineers, or technology consultants. Those new to the field will also benefit from a number of introductory chapters, outlining the basics for the most important biometrics.
Electronic digital computers—Evaluation. --- Biometric identification. --- Computer science—Mathematics. --- Mathematical statistics. --- System Performance and Evaluation. --- Biometrics. --- Probability and Statistics in Computer Science. --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Sampling (Statistics) --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification --- Statistical methods --- Biometric identification --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Listing 1 - 10 of 20 | << page >> |
Sort by
|