Головна Спрощенний режим Опис Шлюз Z39.50
Авторизація
Прізвище
Пароль
 

Бази даних


Доступ до повнотекстових книг Springer Nature (через IP-адреси БДМУ) - результати пошуку

Вид пошуку

Зона пошуку
у знайденому
Формат представлення знайдених документів:
повнийінформаційнийкороткий
Відсортувати знайдені документи за:
авторомназвоюроком виданнятипом документа
Пошуковий запит: (<.>S=Operating Systems.<.>)
Загальна кiлькiсть документiв : 29
Показанi документи с 1 за 20
 1-20    21-29 
1.


   
    Neural Information Processing [[electronic resource] :] : 24th International Conference, ICONIP 2017, Guangzhou, China, November 14–18, 2017, Proceedings, Part VI / / ed. Liu, Derong. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 912 p. 415 illus. - Б. ц.
    Зміст:
Machine Learning --
Reinforcement Learning --
Big Data Analysis --
Deep Learning --
Brain-Computer Interface --
Computational Finance --
Computer Vision, --
Neurodynamics --
Sensory Perception and Decision Making --
Computational Intelligence --
Neural Data Analysis --
Biomedical Engineering --
Emotion and Bayesian Networks --
Data Mining --
Time-Series Analysis --
Social Networks --
Bioinformatics --
Information Security and Social Cognition --
Robotics and Control --
Pattern Recognition --
Neuromorphic Hardware and Speech Processing.
Рубрики: Artificial intelligence.
   Optical data processing.

   Special purpose computers.

   Operating systems (Computers).

   Logic design.

   Artificial Intelligence.

   Image Processing and Computer Vision.

   Special Purpose and Application-Based Systems.

   Operating Systems.

   Logic Design.

Анотація: The six volume set LNCS 10634, LNCS 10635, LNCS 10636, LNCS 10637, LNCS 10638, and LNCS 10639 constitues the proceedings of the 24rd International Conference on Neural Information Processing, ICONIP 2017, held in Guangzhou, China, in November 2017. The 563  full papers presented were carefully reviewed and selected from 856 submissions. The 6 volumes are organized in topical sections on Machine Learning, Reinforcement Learning, Big Data Analysis, Deep Learning, Brain-Computer Interface, Computational Finance, Computer Vision, Neurodynamics, Sensory Perception and Decision Making, Computational Intelligence, Neural Data Analysis, Biomedical Engineering, Emotion and Bayesian Networks, Data Mining, Time-Series Analysis, Social Networks, Bioinformatics, Information Security and Social Cognition, Robotics and Control, Pattern Recognition, Neuromorphic Hardware and Speech Processing.

Перейти: https://doi.org/10.1007/978-3-319-70136-3

Дод.точки доступу:
Liu, Derong. \ed.\; Xie, Shengli. \ed.\; Li, Yuanqing. \ed.\; Zhao, Dongbin. \ed.\; El-Alfy, El-Sayed M. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

2.


   
    Brain Informatics [[electronic resource] :] : international Conference, BI 2017, Beijing, China, November 16-18, 2017, Proceedings / / ed. Zeng, Yi. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 336 p. 100 illus. - Б. ц.
Рубрики: Artificial intelligence.
   Pattern recognition.

   Optical data processing.

   User interfaces (Computer systems).

   Data mining.

   Operating systems (Computers).

   Artificial Intelligence.

   Pattern Recognition.

   Image Processing and Computer Vision.

   User Interfaces and Human Computer Interaction.

   Data Mining and Knowledge Discovery.

   Operating Systems.

Анотація: This book constitutes the refereed proceedings of the International Conference on Brain Informatics, BI 2017, held in Beijing, China, in November 2017. The 31 revised full papers were carefully reviewed and selected from 64 submissions. BI addresses the computational, cognitive, physiological, biological, physical, ecological and social perspectives of brain informatics, as well as topics related to mental health and well-being.

Перейти: https://doi.org/10.1007/978-3-319-70772-3

Дод.точки доступу:
Zeng, Yi. \ed.\; He, Yong. \ed.\; Kotaleski, Jeanette Hellgren. \ed.\; Martone, Maryann. \ed.\; Xu, Bo. \ed.\; Peng, Hanchuan. \ed.\; Luo, Qingming. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

3.


   
    Engineering Secure Software and Systems [[electronic resource] :] : 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings / / ed.: Bodden, Eric., Payer, Mathias., Athanasopoulos, Elias. - 1st ed. 2017. - [S. l. : s. n.]. - X, 241 p. 63 illus. - Б. ц.
    Зміст:
Cloud security, virtualization for security --
Mobile devices security --
Automated techniques for vulnerability discovery and analysis --
Model checking for security --
Verification techniques for security properties --
Security by design --
Web applications security --
Empirical secure software engineering --
Embedded software security.
Рубрики: Computer communication systems.
   Computer security.

   Logic design.

   Operating systems (Computers).

   Software engineering.

   Data encryption (Computer science).

   Computer Communication Networks.

   Systems and Data Security.

   Logic Design.

   Operating Systems.

   Software Engineering.

   Cryptology.

Анотація: This book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017. The 12 full papers presented together with 3 short papers were carefully reviewed and selected from 32 submissions. The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering.

Перейти: https://doi.org/10.1007/978-3-319-62105-0

Дод.точки доступу:
Bodden, Eric. \ed.\; Payer, Mathias. \ed.\; Athanasopoulos, Elias. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

4.


   
    Verification and Evaluation of Computer and Communication Systems [[electronic resource] :] : 11th International Conference, VECoS 2017, Montreal, QC, Canada, August 24–25, 2017, Proceedings / / ed. Barkaoui, Kamel. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 205 p. 76 illus. - Б. ц.
    Зміст:
Distributed computing models.- Formal languages and automata theory.- Concurrency.- Probabilistic computation --
Timed and hybrid models.- Formal software verification.- Model verification and validation.- Performance evaluation --
Control methods --
Modeling methodologies --
Model development and analysis --
Modeling and simulation.- Formal mehods.
Рубрики: Algorithms.
   Software engineering.

   Operating systems (Computers).

   Programming languages (Electronic computers).

   Computer programming.

   Artificial intelligence.

   Algorithm Analysis and Problem Complexity.

   Software Engineering.

   Operating Systems.

   Programming Languages, Compilers, Interpreters.

   Programming Techniques.

   Artificial Intelligence.

Анотація: This book constitutes the proceedings of the 11th International Conference International Conference on Veri?cation and Evaluation of Computer and Communication Systems ( VECoS 2017 ), held at Concordia University, Montreal, Canada, in August 2017. The 13 full papers, together with 3 abstracts in this volume were carefully reviewed and selected from 35 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of veri?cation, control, performance and dependability evalu-ation in order to discuss state-of-the-art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly in terrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal veri?cation and evaluation approaches, methods and techniques, and especially those developed for concurrent and dis-tributed hardware/software systems.

Перейти: https://doi.org/10.1007/978-3-319-66176-6

Дод.точки доступу:
Barkaoui, Kamel. \ed.\; Boucheneb, Hanifa. \ed.\; Mili, Ali. \ed.\; Tahar, Sofiene. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

5.


   
    Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXIV [[electronic resource] :] : special Issue on Consistency and Inconsistency in Data-Centric Applications / / ed. Hameurlain, Abdelkader. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - IX, 185 p. 34 illus. - Б. ц.
    Зміст:
Basic Postulates for Inconsistency Measures --
Batch Composite Transactions in Stream Processing --
Enhancing User Rating Database Consistency through Pruning --
A Second Generation of Peer-to-Peer Semantic Wikis --
Formalizing a Paraconsistent Logic in the Isabelle Proof Assistant --
A Proximity-Based Understanding of Conditionals --
Inconsistency-Tolerant Database Repairs and Simplified Repair Checking by Measure-Based Integrity Checking.
Рубрики: Computer logic.
   Mathematical logic.

   Logic design.

   Operating systems (Computers).

   Microprocessors.

   Logics and Meanings of Programs.

   Mathematical Logic and Formal Languages.

   Logic Design.

   Operating Systems.

   Processor Architectures.

Анотація: LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This volume, the 34th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, constitutes a special issue consisting of seven papers on the subject of Consistency and Inconsistency in Data-Centric Applications. The volume opens with an invited article on basic postulates for inconsistency measures. Three of the remaining six papers are revised, extended versions of papers presented at the First International Workshop on Consistency and Inconsistency, COIN 2016, held in conjunction with DEXA 2016 in Porto, Portugal, in September 2016. The other three papers were selected from submissions to a call for contributions to this edition. Each of the papers highlights a particular subtopic. However, all are concerned with logical inconsistencies that are either to be systematically avoided, or reasoned with consistently, i.e., without running the danger of an explosion of inferences.

Перейти: https://doi.org/10.1007/978-3-662-55947-5

Дод.точки доступу:
Hameurlain, Abdelkader. \ed.\; Kung, Josef. \ed.\; Wagner, Roland. \ed.\; Decker, Hendrik. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

6.


   
    Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] :] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / ed.: Polychronakis, Michalis., Meier, Michael. - 1st ed. 2017. - [S. l. : s. n.]. - X, 412 p. 114 illus. - Б. ц.
    Зміст:
Enclaves and isolation --
Malware analysis --
Cyber-physical systems --
Detection and protection.-Code analysis --
Web security.
Рубрики: Computer security.
   Operating systems (Computers).

   Computers.

   Law and legislation.

   Computers and civilization.

   Application software.

   Data encryption (Computer science).

   Systems and Data Security.

   Operating Systems.

   Legal Aspects of Computing.

   Computers and Society.

   Information Systems Applications (incl. Internet).

   Cryptology.

Анотація: This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.

Перейти: https://doi.org/10.1007/978-3-319-60876-1

Дод.точки доступу:
Polychronakis, Michalis. \ed.\; Meier, Michael. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

7.


   
    Research in Attacks, Intrusions, and Defenses [[electronic resource] :] : 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings / / ed. Dacier, Marc. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 496 p. 115 illus. - Б. ц.
    Зміст:
VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices --
Static Program Analysis as a Fuzzing Aid --
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit --
Lens on the endpoint: Hunting for malicious software through endpoint data analysis --
Redemption: Real-time Protection Against Ransomware at End-Hosts --
ILAB: An Interactive Labelling Strategy for Intrusion Detection --
Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps --
Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level --
Android Malware Clustering through Malicious Payload Mining --
Stealth Loader: Trace-free Program Loading for API Obfuscation --
LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization --
CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers            --
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises --
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems --
Trapped by the UI: The Android case --
Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults --
Secure In-Cache Execution --
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage --
Linking Amplification DDoS Attacks to Booter Services --
Practical and Accurate Runtime Application Protection against DoS Attacks --
Exploring the ecosystem of malicious domain registrations in the .eu TLD.
Рубрики: Computer security.
   Data protection.

   Data encryption (Computer science).

   Management information systems.

   Computer science.

   Computer communication systems.

   Operating systems (Computers).

   Systems and Data Security.

   Security.

   Cryptology.

   Management of Computing and Information Systems.

   Computer Communication Networks.

   Operating Systems.

Анотація: This book constitutes the refereed conference proceedings of the 20th  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017. The 21 revised full papers were selected from 105 submissions. They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.

Перейти: https://doi.org/10.1007/978-3-319-66332-6

Дод.точки доступу:
Dacier, Marc. \ed.\; Bailey, Michael. \ed.\; Polychronakis, Michalis. \ed.\; Antonakakis, Manos. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

8.


    Vohra, Deepak.
    Kubernetes Management Design Patterns [[electronic resource] :] : with Docker, CoreOS Linux, and Other Platforms / / Deepak. Vohra ; . - 1st ed. 2017. - [S. l. : s. n.]. - XX, 399 p. 560 illus., 500 illus. in color. - Б. ц.
    Зміст:
Part I  Platforms --
1. Kubernetes On AWS --
2. Kubernetes on CoreOS --
3. Kubernetes on Google Cloud Platform. Part 2 Administration and Configuration --
4. Using Multiple Zones --
5. Using the Tectonic Console --
6. Using Volumes --
7. Using Services --
8. Using Rolling Updates --
9. Scheduling Pods --
10. Configuring Compute Resources --
11. Using Configmaps --
12. Setting Resource Quotas --
13. Using Autoscaling --
14. Configuring Logging. Part 3 High Availability --
15. Using a HA Master with OpenShift --
16. Developing a Highly Available Web Site.
Рубрики: Client/server computing.
   Operating systems (Computers).

   Computer programming.

   Servers.

   Operating Systems.

   Programming Techniques.

Анотація: Take container cluster management to the next level; learn how to administer and configure Kubernetes on CoreOS; and apply suitable management design patterns such as Configmaps, Autoscaling, elastic resource usage, and high availability.  Some of the other features discussed are logging, scheduling, rolling updates, volumes, service types, and multiple cloud provider zones.   The atomic unit of modular container service in Kubernetes is a Pod, which is a group of containers with a common filesystem and networking. The Kubernetes Pod abstraction enables design patterns for containerized applications similar to object-oriented design patterns. Containers provide some of the same benefits as software objects such as modularity or packaging, abstraction, and reuse. CoreOS Linux is used in the majority of the chapters and other platforms discussed are CentOS with OpenShift, Debian 8 (jessie) on AWS, and Debian 7 for Google Container Engine.   You will: Use Kubernetes with Docker Create a Kubernetes cluster on CoreOS on AWS Apply cluster management design patterns Use multiple cloud provider zones Work with Kubernetes and tools like Ansible Discover the Kubernetes-based PaaS platform OpenShift Create a high availability website Build a high availability Kubernetes master cluster Use volumes, configmaps, services, autoscaling, and rolling updates Manage compute resources Configure logging and scheduling.

Перейти: https://doi.org/10.1007/978-1-4842-2598-1

Дод.точки доступу:
Vohra, Deepak. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

9.


    Bettany, Andrew.
    Windows Virus and Malware Troubleshooting [[electronic resource] /] : монография / Andrew. Bettany, Halsey, Mike. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XVII, 95 p. 49 illus., 48 illus. in color. - Б. ц.
    Зміст:
1. What is Malware? --
2. Prevention and Defense --
3. Malware Defense in Depth --
4. Identifying Attacks --
5. External Malware and Virus Resources --
6. Manually Removing Malware.
Рубрики: Microsoft software.
   Microsoft .NET Framework.

   Data protection.

   Operating systems (Computers).

   Microsoft and .NET.

   Security.

   Operating Systems.

Анотація: Make your PCs as secure as possible. Limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. Whatever version of Windows you’re using, the threat of virus and malware infection is always a danger. From key loggers and Trojans, intent on stealing passwords and data, to malware that can disable individual PCs or even a company network, the cost to business in downtime and loss of productivity can be enormous. What You Will Learn: Recognize malware and the problems it can cause Defend a PC against malware and viruses Configure advanced Windows features to prevent attack Identify types of malware and virus attack Discover third-party tools and resources available to help remove malware Manually remove malware and viruses from a PC.

Перейти: https://doi.org/10.1007/978-1-4842-2607-0

Дод.точки доступу:
Halsey, Mike.; Bettany, Andrew. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

10.


    Vohra, Deepak.
    Docker Management Design Patterns [[electronic resource] :] : swarm Mode on Amazon Web Services / / Deepak. Vohra ; . - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 320 p. 239 illus., 210 illus. in color. - Б. ц.
    Зміст:
1: Getting Started with Docker --
2: Using Docker in Swarm Mode --
3: Using Docker for AWS to Create a Multi-Zone Swarm --
4: Docker Services --
5: Scaling Services --
6: Using Mounts --
7: Configuring Resources --
8: Scheduling --
9: Rolling Updates --
10: Networking --
11: Logging and Monitoring --
12: Load Balancing --
13: Developing a Highly Available Website --
14: Using Swarm Mode in Docker Cloud --
15: Using Service Stacks.
Рубрики: Application software.
   Operating systems (Computers).

   Management information systems.

   Computer Applications.

   Operating Systems.

   Software Management.

Анотація: Master every aspect of orchestrating/managing Docker including creating a Swarm, creating services, using mounts, scheduling, scaling, resource management, rolling updates, load balancing, high availability, logging and monitoring, using multiple zones, and networking. This book also discusses the managed services for Docker Swarm: Docker for AWS and Docker Cloud Swarm mode. Docker Management Design Patterns explains how to use Docker Swarm mode with Docker Engine to create a distributed Docker container cluster and how to scale a cluster of containers, schedule containers on specific nodes, and mount a volume. You will learn to provision a Swarm on production-ready AWS EC2 nodes, and to link Docker Cloud to Docker for AWS to provision a new Swarm or connect to an existing Swarm. Finally, you will learn to deploy a Docker Stack on Docker Swarm with Docker Compose.  You will: Appl y Docker management design patterns Use Docker Swarm mode and other new features introduced in Docker 1.12 and 1.13 Create and scale a Docker service Use mounts including volumes Configure scheduling, load balancing, high availability, logging and monitoring, rolling updates, resource management, and networking Use Docker for AWS managed services including a multi-zone Swarm Build Docker Cloud managed services in Swarm mode.

Перейти: https://doi.org/10.1007/978-1-4842-2973-6

Дод.точки доступу:
Vohra, Deepak. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

11.


    Halsey, Mike.
    The Windows 10 Productivity Handbook [[electronic resource] :] : discover Expert Tips, Tricks, and Hidden Features in Windows 10 / / Mike. Halsey ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIII, 129 p. 91 illus. in color. - Б. ц.
    Зміст:
1. Getting up to Speed with Windows 10.- 2. Making your PC More Pleasurable to Use --
3. Achieving More with Windows 10.- 4. Productivity Boost Tips and Tricks --
5. Maximize your Windows Experience --
6. Using Search to Keep Yourself Organized --
7. Managing Windows Settings and Configuration --
8. Managing Network Connections and Devices --
9. Keeping Yourself and Your Data Safe and Secure --
10. Maintaining a Stable and Reliable Working Environment --
Appendix A. Windows 10 Shortcut Keys --
Appendix B. Windows 10 Touch and Trackpad Gestures --
Appendix C. Advanced Query Syntax for Search.
Рубрики: Microsoft software.
   Microsoft .NET Framework.

   Operating systems (Computers).

   Microsoft and .NET.

   Operating Systems.

Анотація: Use the tricks and hidden features in this guide to become more productive with Windows 10. You will save time, achieve more, and feel in control like never before. Author Mike Halsey is a Microsoft MVP (Most Valuable Professional) awardee and technical expert. As the author of Windows 7, 8, and 10 Troubleshooting and support books and videos, he takes complex subjects and presents them in simple and straightforward ways. In this book, Mike helps solve the problems and issues that you are likely to face when you want to achieve more and get better results on your PCs. What You'll Learn: Get up to speed with Windows 10 Use tips and tricks to boost productivity Stay organized using search Manage settings and configuration, and network connections and devices Keep yourself and your data safe and secure Make your PC more pleasurable to use.

Перейти: https://doi.org/10.1007/978-1-4842-3294-1

Дод.точки доступу:
Halsey, Mike. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

12.


    Wang, K. C.
    Embedded and Real-Time Operating Systems [[electronic resource] /] : монография / K. C. Wang ; . - 1st ed. 2017. - [S. l. : s. n.]. - XIX, 481 p. 93 illus. - Б. ц.
    Зміст:
Introduction --
ARM Architecture and Programming --
Exceptions and Interrupts Processing --
Models of Embedded Systems --
Process Management in Embedded Systems --
Process Management in Embedded Systems --
Memory Management --
User Mode Processes and System Calls --
General Purpose Embedded Operating Systems --
Multiprocessing in Embedded Systems --
Embedded Real-Time Operating Systems.
Рубрики: Electronic circuits.
   Operating systems (Computers).

   Circuits and Systems.

   Operating Systems.

Анотація: This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs). Throughout the book, complete working sample systems demonstrate the design principles and implementation techniques. The content is suitable for advanced-level and graduate students working in software engineering, programming, and systems theory.

Перейти: https://doi.org/10.1007/978-3-319-51517-5

Дод.точки доступу:
Wang, K.C. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

13.


    Krishna Kaiser, Kaiser, Abhinav.
    Become ITIL Foundation Certified in 7 Days [[electronic resource] :] : learning ITIL Made Simple with Real-life Examples / / Kaiser, Abhinav. Krishna Kaiser ; . - 1st ed. 2017. - [S. l. : s. n.]. - XXIII, 251 p. 60 illus., 54 illus. in color. - Б. ц.
    Зміст:
Chapter 1: Service Management as a Practice --
Chapter 2: ITIL Service Lifecycle --
Chapter 3: Generic Concepts of ITIL and IT Service Management. Chapter 4: Service Strategy --
Chapter 5: Service Design --
Chapter 6: Service Transition --
Chapter 7: Service Operations --
Chapter 8: Continual Service Improvement --
Chapter 9: ITIL Foundation Exam Tips and FAQs.
Рубрики: Application software.
   Computer hardware.

   Computer communication systems.

   Architecture, Computer.

   Operating systems (Computers).

   Computer security.

   Computer Applications.

   Computer Hardware.

   Computer Communication Networks.

   Computer System Implementation.

   Operating Systems.

   Systems and Data Security.

Анотація: Pass the ITIL Foundation examination by learning the basics of ITIL and working through real-life examples. This book breaks the course down for studying in 7 days with 3 hours a day, which means at the end of a week you are ready to pass the exam. You'll also see tips and an array of sample questions, as well as FAQs on ITIL. All this will prepare you for the examination and give you the knowledge required to pass with flying colors. After using Become ITIL Foundation Certified in 7 Days and earning the ITIL Foundation certification, you'll be well placed to get the career you always wanted. What You Will Learn Gain ITIL basics – the entire syllabus designed of the ITIL Foundation certification Obtain a deep-rooted understanding of ITIL topics and not textbook knowledge Prepare for the ITIL Foundation examination Sort out career-related queries and decide whether ITIL will aid your career Who This Book Is For IT professionals from the IT services industry are the primary audience. .

Перейти: https://doi.org/10.1007/978-1-4842-2164-8

Дод.точки доступу:
Krishna Kaiser, Abhinav. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

14.


    Wang, Wallace.
    macOS Programming for Absolute Beginners [[electronic resource] :] : developing Apps Using Swift and Xcode / / Wallace. Wang ; . - 1st ed. 2017. - [S. l. : s. n.]. - XXVI, 647 p. 360 illus., 349 illus. in color. - Б. ц.
Рубрики: Computer programming.
   Programming languages (Electronic computers).

   Operating systems (Computers).

   Apple computer.

   Programming Techniques.

   Programming Languages, Compilers, Interpreters.

   Operating Systems.

   Apple and iOS.

Анотація: Learn how to code for the iMac, Mac mini, Mac Pro, and MacBook using Swift, Apple's hottest programming language. Fully updated to cover the new MacBook Touch Bar, macOS Programming for Absolute Beginners will not only teach complete programming novices how to write macOS programs, but it can also help experienced programmers moving to the Mac for the first time. You will learn the principles of programming, how to use Swift and Xcode, and how to combine your knowledge into writing macOS programs. If you've always wanted to learn coding but felt stymied by the limitation of simplistic programming languages or intimidated by professional but complicated programming languages, then you'll want to learn Swift. Swift is your gateway to both Mac and iOS app development while being powerful and easy to learn at the same time, and macOS Programming for Absolute Beginners is the perfect place to start - add it to your library today.

Перейти: https://doi.org/10.1007/978-1-4842-2662-9

Дод.точки доступу:
Wang, Wallace. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

15.


   
    Search Based Software Engineering [[electronic resource] :] : 9th International Symposium, SSBSE 2017, Paderborn, Germany, September 9-11, 2017, Proceedings / / ed.: Menzies, Tim., Petke, Justyna. - 1st ed. 2017. - [S. l. : s. n.]. - XXVI, 197 p. 33 illus. - Б. ц.
    Зміст:
Search-Based Software Engineering --
Software testing --
Automated Program Repair --
Software Evolution --
Combinatorial Testing --
Software Requirements Analysis --
Software Configuration --
Multi-Objective Optimization --
Evolutionary computation --
Software Diversity --
Mutation Testing.
Рубрики: Software engineering.
   Operating systems (Computers).

   Programming languages (Electronic computers).

   Artificial intelligence.

   Algorithms.

   Logic design.

   Software Engineering.

   Operating Systems.

   Programming Languages, Compilers, Interpreters.

   Artificial Intelligence.

   Algorithm Analysis and Problem Complexity.

   Logic Design.

Анотація: This book constitutes the refereed proceedings of the 9th International Symposium on Search-Based Software Engineering, SSBSE 2017, held in Paderborn, Germany, in September 2017.  The 7 full papers and 5 short papers presented together with 4 challenge track and 2 students student track papers were carefully reviewed and selected from 26 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing.

Перейти: https://doi.org/10.1007/978-3-319-66299-2

Дод.точки доступу:
Menzies, Tim. \ed.\; Petke, Justyna. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

16.


    Chen, Quan.
    Task Scheduling for Multi-core and Parallel Architectures [[electronic resource] :] : challenges, Solutions and Perspectives / / Quan. Chen, Guo, Minyi. ; . - 1st ed. 2017. - [S. l. : s. n.]. - XVIII, 243 p. 107 illus., 73 illus. in color. - Б. ц.
    Зміст:
Chapter 1 Introduction --
Chapter 2 Conventional Task Scheduling --
Chapter 3 Task Scheduling for Multi-socket Architecture --
Chapter 4 Task Scheduling for NUMA-enabled Architecture --
Chapter 5 Task Scheduling for Asymmetric Multi-core Architecture --
Chapter 6 Task Scheduling for Heterogeneous Parallel Architecture --
Chapter 7 Task Scheduling for Datacenter --
Chapter 8 Task Scheduling for Distributed System --
Chapter 9 Summary and Perspectives.
Рубрики: Microprocessors.
   Operating systems (Computers).

   Computer hardware.

   Computer science—Mathematics.

   Processor Architectures.

   Operating Systems.

   Computer Hardware.

   Mathematics of Computing.

Анотація: This book presents task-scheduling techniques for emerging complex parallel architectures including heterogeneous multi-core architectures, warehouse-scale datacenters, and distributed big data processing systems. The demand for high computational capacity has led to the growing popularity of multicore processors, which have become the mainstream in both the research and real-world settings. Yet to date, there is no book exploring the current task-scheduling techniques for the emerging complex parallel architectures. Addressing this gap, the book discusses state-of-the-art task-scheduling techniques that are optimized for different architectures, and which can be directly applied in real parallel systems. Further, the book provides an overview of the latest advances in task-scheduling policies in parallel architectures, and will help readers understand and overcome current and emerging issues in this field.

Перейти: https://doi.org/10.1007/978-981-10-6238-4

Дод.точки доступу:
Guo, Minyi.; Chen, Quan. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

17.


   
    Reliable Software Technologies – Ada-Europe 2017 [[electronic resource] :] : 22nd Ada-Europe International Conference on Reliable Software Technologies, Vienna, Austria, June 12-16, 2017, Proceedings / / ed.: Blieberger, Johann., Bader, Markus. - 1st ed. 2017. - [S. l. : s. n.]. - XIV, 251 p. 61 illus. - Б. ц.
    Зміст:
Runtimes --
Safety and security --
Timing verification --
Programming models --
The future of safety-minded languages --
Mixed criticality.
Рубрики: Programming languages (Electronic computers).
   Software engineering.

   Special purpose computers.

   Computer logic.

   Operating systems (Computers).

   Programming Languages, Compilers, Interpreters.

   Software Engineering.

   Special Purpose and Application-Based Systems.

   Logics and Meanings of Programs.

   Operating Systems.

Анотація: This book constitutes the refereed proceedings of the 22nd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2017, held in Vienna, Austria, in June 2017. The revised 15 full papers presented were carefully reviewed and selected from 37 submissions. They are organized in topical sections on runtimes, safety and security, timing verification, programming models, the future of safety-minded languages, mixed criticality.

Перейти: https://doi.org/10.1007/978-3-319-60588-3

Дод.точки доступу:
Blieberger, Johann. \ed.\; Bader, Markus. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

18.


   
    Advanced Parallel Processing Technologies [[electronic resource] :] : 12th International Symposium, APPT 2017, Santiago de Compostela, Spain, August 29, 2017, Proceedings / / ed. Dou, Yong. [et al.]. - 1st ed. 2017. - [S. l. : s. n.]. - IX, 129 p. 74 illus. - Б. ц.
    Зміст:
Platform-Adaptive High-Throughput Surveillance Video Condensation on Heterogeneous Processor Clusters --
Using Data Compression for Optimizing FPGA-based Convolutional Neural Network Accelerators --
Molecular docking Simulation Based on CPU-GPU Heterogeneous Computing --
FixCaffe: Training CNN with Low Precision Arithmetic Operations by Deep Learning Framework Caffe --
SysMon: Monitoring Memory Behaviors via OS Approach --
Self-adaptive Failure Detector for Peer-to-Peer Distributed System Considering the Link Faults --
A Survey about Quantitative Measurement of Performance Variability in High Performance Computers --
GDCRT: In-Memory 2D Geographical Dynamic Cascading Range Tree --
Eleven Code: A 3-Erasure MDS Code with Optimize Partial Stripes Writes --
Parallel Peer Pressure Clustering Algorithm based on Linear Algebra Computation --
T-List: A Concurrent Skip List Balanced on Search.
Рубрики: Software engineering.
   Algorithms.

   Computer communication systems.

   Operating systems (Computers).

   Programming languages (Electronic computers).

   Microprocessors.

   Software Engineering.

   Algorithm Analysis and Problem Complexity.

   Computer Communication Networks.

   Operating Systems.

   Programming Languages, Compilers, Interpreters.

   Processor Architectures.

Анотація: This book constitutes the proceedings of the 12th International Symposium on Advanced Parallel Processing Technologies, APPT 2017, held in Santiago de Compostela, Spain, in August 2017. The 11 regular papers presented in this volume were carefully reviewed and selected from 18 submissions. They deal with the recent advances in big data processing; parallel architectures and systems; parallel software; parallel algorithms and artificial intelligence applications; and distributed and cloud computing.

Перейти: https://doi.org/10.1007/978-3-319-67952-5

Дод.точки доступу:
Dou, Yong. \ed.\; Lin, Haixiang. \ed.\; Sun, Guangyu. \ed.\; Wu, Junjie. \ed.\; Heras, Dora. \ed.\; Bouge, Luc. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

19.


    Milutinovic, Veljko.
    DataFlow Supercomputing Essentials [[electronic resource] :] : algorithms, Applications and Implementations / / Veljko. Milutinovic, Kotlar, Milos. [et al.] ; . - 1st ed. 2017. - [S. l. : s. n.]. - XI, 150 p. 52 illus., 50 illus. in color. - Б. ц.
    Зміст:
Part I: Algorithms --
Implementing Neural Networks by Using the DataFlow Paradigm --
Part II: Applications --
Solving the Poisson Equation by Using Dataflow Technology --
Binary Search in the DataFlow Paradigm --
Part III: Implementations --
Introductory Overview on Implementation Tools --
DataFlow Systems: From Their Origins to Future Applications in Data Analytics, Deep Learning, and the Internet of Things.
Рубрики: Operating systems (Computers).
   Computer system failures.

   Computer engineering.

   Big data.

   Operating Systems.

   System Performance and Evaluation.

   Computer Engineering.

   Big Data.

Анотація: This illuminating text/reference reviews the fundamentals of programming for effective DataFlow computing. The DataFlow paradigm enables considerable increases in speed and reductions in power consumption for supercomputing processes, yet the programming model requires a distinctly different approach. The algorithms and examples showcased in this book will help the reader to develop their understanding of the advantages and unique features of this methodology. This work serves as a companion title to DataFlow Supercomputing Essentials: Research, Development and Education, which analyzes the latest research in this area, and the training resources available. Topics and features: Presents an implementation of Neural Networks using the DataFlow paradigm, as an alternative to the traditional ControlFlow approach Discusses a solution to the three-dimensional Poisson equation, using the Fourier method and DataFlow technology Examines how the performance of the Binary Search algorithm can be improved through implementation on a DataFlow architecture Reviews the different way of thinking required to best configure the DataFlow engines for the processing of data in space flowing through the devices Highlights how the DataFlow approach can efficiently support applications in big data analytics, deep learning, and the Internet of Things This indispensable volume will benefit all researchers interested in supercomputing in general, and DataFlow computing in particular. Advanced undergraduate and graduate students involved in courses on Data Mining, Microprocessor Systems, and VLSI Systems, will also find the book to be an invaluable resource.

Перейти: https://doi.org/10.1007/978-3-319-66125-4

Дод.точки доступу:
Kotlar, Milos.; Stojanovic, Marko.; Dundic, Igor.; Trifunovic, Nemanja.; Babovic, Zoran.; Milutinovic, Veljko. \.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

20.


   
    Big Data Management [[electronic resource] /] : монография / ed.: Garcia Marquez, Fausto Pedro., Lev, Benjamin. - 1st ed. 2017. - [S. l. : s. n.]. - XVI, 267 p. 107 illus., 38 illus. in color. - Б. ц.
    Зміст:
Introduction --
The Big Data Business Opportunity --
The Business Transformation by Big Data --
Data Integration and Management Science --
Novel Approaches for Big Data Analytics --
Case Studies: Engineering; Financial; Economic; Business; Project Management --
Signal Processing.
Рубрики: Management information systems.
   Engineering economics.

   Engineering economy.

   Operating systems (Computers).

   Operations research.

   Decision making.

   Management.

   Industrial management.

   Business Information Systems.

   Engineering Economics, Organization, Logistics, Marketing.

   Operating Systems.

   Operations Research/Decision Theory.

   Innovation/Technology Management.

Анотація: This book focuses on the analytic principles of business practice and big data. Specifically, it provides an interface between the main disciplines of engineering/technology and the organizational and administrative aspects of management, serving as a complement to books in other disciplines such as economics, finance, marketing and risk analysis. The contributors present their areas of expertise, together with essential case studies that illustrate the successful application of engineering management theories in real-life examples.

Перейти: https://doi.org/10.1007/978-3-319-45498-6

Дод.точки доступу:
Garcia Marquez, Fausto Pedro. \ed.\; Lev, Benjamin. \ed.\; SpringerLink (Online service)
Свободных экз. нет
Знайти схожі

 1-20    21-29 
 
© Міжнародна Асоціація користувачів і розробників електронних бібліотек і нових інформаційних технологій
(Асоціація ЕБНІТ)