Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems. This book offers solutions for the development of energy efficient applications using FPGAs. It provides a framework for high-level hardware-software application development and describes energy performance modeling for system-on-chip devices.
Trust-Worthy Cyber Physical Systems Engineering provides practitioners and researchers with a comprehensive introduction to the area of trustworthy Cyber Physical Systems (CPS) engineering. Featuring contributions from leading international experts, the book contains sixteen self-contained chapters that analyze the challenges in develop
We face many environmental, technological, societal and economic challenges. To address these challenges, it is important to deploy information and communication technologies (ICT) throughout our homes and cities. This book introduces enabling technologies, from machine-to-machine communications to Internet of Things.
Evolutionary multi-objective optimization (EMO) has emerged as a sub-discipline of multi-objective optimization, combining the fields of evolutionary computation and classical multiple criteria decision making. This field has applications in artificial intelligence, machine learning, and data mining. This book will present new trends, methods, algorithms, and applications in EMO for system design, featuring contributions from leading experts.
Preserving the excellence and accessibility of its best-selling predecessor, this second edition once again provides all the fundamentals and applications in one complete, self-contained source. It incorporates contributions from many veterans of the DARPA ISO SENSIT program as well as new material from distinguished researchers in the field. Sensor Networking and Applications focuses on sensor deployment and networking, adaptive tasking, self-configuration, and system control. In the expanded applications section, the book draws on the insight of practitioners in the field.
Preserving the excellence and accessibility of its best-selling predecessor, this second edition once again provides all the fundamentals and applications in one complete, self-contained source. It incorporates contributions from many veterans of the DARPA ISO SENSIT program as well as new material from distinguished researchers in the field. Image and Sensor Signal Processing focuses on software issues and the history and future of sensor networks. The book also covers information fusion and power management.
This pivotal book provides a highly accessible, balanced treatment of the underlying theory and practical applications of distributed computing. As in the previous version, the language of the Second Edition is kept as unobscured as possible¿clarity is given priority over mathematical formalism. Containing significant updates that mirror the phenomenal growth of distributed systems, this easily digestible text includes fresh exercises, examples, and case studies and explores new topics related to peer-to-peer and social networks. A solutions manual is available with qualifying course adoption.
Presents an analysis of key scaling technologies. This book demonstrates the effectiveness of the technologies via mathematical modeling and analysis, simulation, and practical implementations. It describes the underlying principles of the technologies and the application of these principles.
Focuses on the major areas of real-time and embedded systems. This title examines real-time scheduling and resource management issues and explores the programming languages, paradigms, operating systems, and middleware for these systems. It also presents challenges encountered in wireless sensor networks and offers ways to solve these problems.
Going beyond, yet thoroughly rooted to theory, this book provides a comprehensive look at the algorithms that can produce quality Delaunay meshes through a paradigm called the Delaunay refinement. It describes meshing algorithms that can be built on the Delaunay refinement paradigm along with the involved mathematical analysis.
Analyzes a broad array of technologies and concerns that are related to the Internet, including corporate intranets. This book covers architectures, enabling technologies, software utilities, and engineering techniques that are necessary to conduct distributed computing and take advantage of Web-based services.
This book provides a comprehensive survey of data structures of various types. The second edition has been revised and updated with new chapters on Bloom Filters, Binary Decision Diagrams, Data Structures for Cheminformatics, and Data Structures for Big Data Stores.
With examples and exercises, this work develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks. It includes analytically tractable models, and presents models for complex systems as analyzable modifications and interconnections of simple models.
Presents different issues involved in vehicular networking, including traffic engineering, human factors studies, and novel computer science research. This book covers traffic monitoring and traffic flow modeling, innovative applications enabled by vehicular networks, routing and localization, and simulation.
Featuring approaches that draw from disciplines such as artificial intelligence and cognitive modeling, this title describes technologies and applications that address a range of practical problems, including military planning and command, military and foreign intelligence, antiterrorism and domestic security, and simulation and training systems.
Focuses on several aspects of mobile computing. Following an analysis of fundamental algorithms and protocols, this book offers a basic overview of wireless technologies and networks. Other topics include issues related to mobility, aspects of QoS provisioning in wireless networks, and future applications.
Surveying the progress made in field of computational biology, this book covers various techniques and methodologies. With discussions ranging from fundamental concepts to practical applications, it details the algorithms necessary to solve novel problems and manage the massive amounts of data housed in biological databases throughout the world.
Presents theories, techniques, and methods used for analyzing algorithms. This text provides information on asymptotics, including Rice's method, the Euler and Boole summation formulas, and recurrences. It offers tutorials on such topics as: continued fractions, functions of a complex variable, numerical calculations, and Stieltjes integration.
Contains theoretical and philosophical discussions, pseudocodes for algorithms, and computing paradigms that illustrate how computational techniques can solve complex problems, simulate nature, explain natural phenomena, and allow the development of new computing technologies.
This handbook reflects the tremendous growth in the field, over the past two decades. Through contributions from leading experts, this handbook provides a comprehensive introduction to the underlying theory and methodologies, as well as the various applications of approximation algorithms and metaheuristics.
This book reflects the tremendous growth in the field over the past two decades. Volume 2 focuses on the contemporary and emerging applications of methodologies to problems in combinatorial optimization, computational geometry and graphs problems, as well as in emerging applications.
Covers advanced topics in scheduling, assembling researchers from various relevant disciplines to facilitate fresh insights. This title provides introductory material, with tutorials and algorithms, and examines classical scheduling problems. It explores scheduling models that originate in areas such as computer science and operations research.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.