1 - 20
Next
- ISCTCS (Conference) (2014 : Beijing, China)
- Heidelberg : Springer, 2015.
- Description
- Book — 1 online resource (xii, 414 pages) : illustrations
- Summary
-
- Architecture for trusted computing systems
- Trusted computing platform
- Trusted system building; network and protocol security
- Mobile network security
- Network survivability, other critical theories and standard systems
- Credible assessment
- Credible measurement and metrics
- Trusted systems
- Trusted networks
- Trusted mobile networks
- Trusted routing
- Trusted software
- Trusted operating systems
- Trusted storage
- Fault-tolerant computing and other key technologies
- Trusted e-commerce and e-government
- Trusted logistics
- Trusted internet of things
- Trusted cloud and other trusted services and applications.
- Buie, Elizabeth.
- Burlington : Elsevier Science, 2012.
- Description
- Book — 1 online resource (447 p.)
- Summary
-
- Introduction
- Chapter 1: A Brief History of User Experience in Government Systems PART I: Public-facing Systems Introduction
- Chapter 2: Usability of Public Web Sites
- Chapter 3: Usability and Government 2.0
- Chapter 4: UX of Transactions
- Chapter 5: Privacy and the Citizen PART II: Internal Systems Introduction
- Chapter 6: Usability in Defense Systems
- Chapter 7: Emergency Response in Simulated Terrorist Attacks
- Chapter 8: National Critical Infrastructures
- Chapter 9: Legislative Drafting Systems PART III: UX Issues Common to Both Public and Internal Systems Introduction
- Chapter 10: Content Strategy
- Chapter 11: Plain Language in Government
- Chapter 12: Ensuring Accessibility for People with Disabilities
- Chapter 13: Mobile Access
- Chapter 14: User Issues in Security
- Chapter 15: Usability of Biometric Systems PART IV: Procurement and Development Introduction
- Chapter 16: Getting UX into the Contract
- Chapter 17: ISO Standards for User-Centered Design and the Specification of Usability
- Chapter 18: User-centered Requirements Definition
- Chapter 19: Models as Representations for Supporting the Development of e-Procedures
- Chapter 20: Evaluation in Government Environments
- Chapter 21: Adapting e-Gov Usability Evaluation to Cultural Contexts PART V: Wider Considerations Introduction
- Chapter 22: Design for Policymaking
- Chapter 23: Service Design and Channel Shifting
- Chapter 24: UX and e-Democracy in Asia Closing Thoughts Resources, Glossary & Acronyms.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
3. Translating Systems Thinking into Practice : A Guide to Developing Incident Reporting Systems [2019]
- Goode, Natassia, author.
- First edition. - Boca Raton, FL : CRC Press, [2018].
- Description
- Book — 1 online resource (308 pages)
- Summary
-
- 1. Systems Thinking and Incident Causation. 2. Systems Thinking and Incident Analysis. 3. A Process Model for Developing an Incident Reporting System. 4.Understanding the Context.5. Identifying the Needs andPriorities of End Users. 6. Adapting Accimap for Use in an Incident Reporting System. 7. Evaluating Reliability and Validity. 8. Designing aPrototype Incident Reporting System. 9. Evaluating Usability. 10. Evaluating Data Quality. 11. Outputs from the Development Process UPLOADS. 12. AnalyzingIncident Data. 13. Designing Incident Prevention Strategies. 14. Lessons Learned, Future Research Directions, and the Incident Reporting Systems of Tomorrow. Appendix A. UPLOADS Contributing Factor Classification Scheme. Appendix B. Examples of Coding Tasks for Reliability and Validity Assessments. Appendix C. UPLOADS Incident Report Form. Appendix D. Training Manual: The UPLOADS Approach to Accident Analysis.
(source: Nielsen Book Data)
- Wysota, Witold, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
- Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Qt; The cross-platform programming; Qt Platform Abstraction; Supported platforms; A journey through time; New in Qt 5; Restructured codebase; Qt Essentials; Qt Add-ons; Qt Quick 2.0; Meta-objects; C++11 support; Choosing the right license; An open source license; A commercial license; Summary; Chapter 2: Installation; Installing the Qt SDK; Time for action
- installing Qt using an online installer; Setting up Qt Creator.
- Time for action
- loading an example projectTime for action
- running the Affine Transformations project; Building Qt from sources; Time for action
- setting up Qt sources using Git; Time for action
- configuring and building Qt; Summary; Chapter 3: Qt GUI Programming; Windows and dialogs; Creating a Qt project; Time for action
- creating a Qt Desktop project; Adding child widgets to a window; Managing widget content; Time for action
- implementing a tic-tac-toe game board; Qt meta-objects; Signals and slots; Time for action
- functionality of a tic-tac-toe board; Properties.
- Declaring a propertyUsing a property; Time for action
- adding properties to the board class; Designing GUIs; Time for action
- designing the game configuration dialog; Time for action
- polishing the dialog; Accelerators and label buddies; The tab order; Signals and slots; Using designer forms; Direct approach; The multiple-inheritance approach; The single inheritance approach; Time for action
- the logic of the dialog; An application's main window; The Qt resource system; Time for action
- the main window of the application; Time for action
- adding a pull-down menu.
- Time for action
- creating a toolbarTime for action
- filling in the central widget; Time for action
- putting it all together; Summary; Chapter 4: Qt Core Essentials; Text handling; Manipulating strings; Encoding and decoding text; Basic string operations; The string search and lookup; Dissecting strings; Converting between numbers and strings; Using arguments in strings; Regular expressions; Time for action
- a simple quiz game; Extracting information out of a string; Finding all pattern occurrences; Data storage; Files and devices; Traversing directories; Getting access to the basic file.
- DevicesTime for action
- implementing a device to encrypt data; Text streams; Data serialization; Binary streams; Time for action
- serialization of a custom structure; XML streams; Time for action
- implementing an XML parser for player data; JSON files; Time for action
- the player data JSON serializer; Time for action
- implementing a JSON parser; QSettings; Summary; Chapter 5: Graphics with Qt; Raster painting; Painter attributes; Widget painting; Time for action
- custom-painted widgets; Time for action
- transforming the viewport; Time for action
- drawing an oscillogram; Input events.
- Time for action
- making oscillograms selectable.
(source: Nielsen Book Data)
- Nevarez, Benjamin.
- Berkeley, CA : Apress, 2016.
- Description
- Book — 1 online resource (213 pages) Digital: text file.PDF.
- Summary
-
- 1. How SQL Server Work
- s2. Analyzing Wait Statistic
- s3. The Query Stor
- e4. SQL Server Configuratio
- n5. tempdb Troubleshooting and Configuratio
- n6. SQL Server In-Memory Technologie
- s7. Performance Troubleshootin
- g8. Indexin
- g9. SQL Server Storage.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Dayar, Tuğrul, author.
- Cham, Switzerland : Springer, [2018]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Introduction.- Modeling with Kronecker Products.- Avoiding Unreachable States.- Preprocessing.- Vector-Kronecker Product Multiplication.- Steady-State Analysis.- Transient Analysis.- Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Giridhar, Chetan, author.
- Second edition. - Birmingham, UK : Pack Publishing, 2016.
- Description
- Book — 1 online resource : illustrations.
- Summary
-
- Cover ; Copyright; Credits; Foreword; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface;
- Chapter 1: Introduction to Design Patterns ; Understanding object-oriented programming; Objects; Classes; Methods; Major aspects of object-oriented programming; Encapsulation; Polymorphism; Inheritance; Abstraction; Composition; Object-oriented design principles; The open/close principle; The inversion of control principle; The interface segregation principle; The single responsibility principle; The substitution principle; The concept of design patterns
- Advantages of design patternsTaxonomy of design patterns; Context
- the applicability of design patterns; Patterns for dynamic languages; Classifying patterns; Creational patterns:; Structural patterns; Behavioral patterns; Summary; Chapter 2: The Singleton Design Pattern ; Understanding the Singleton design pattern; Implementing a classical Singleton in Python; Lazy instantiation in the Singleton pattern; Module-level Singletons; The Monostate Singleton pattern; Singletons and metaclasses; A real-world scenario
- the Singleton pattern, part 1
- A real-world scenario
- the Singleton pattern, part 2Drawbacks of the Singleton pattern; Summary; Chapter 3: Factory Pattern
- Building Factories to Create Objects ; Understanding the Factory pattern; The Simple Factory pattern; The Factory Method pattern; Implementing the Factory Method; Advantages of the Factory method pattern; The Abstract Factory pattern; Implementing the Abstract Factory pattern; The Factory Method versus Abstract Factory; Summary; Chapter 4: The Façade Pattern
- Being Adaptive with Façade ; Understanding Structural design patterns
- Understanding the Façade design patternA UML class diagram; Façade; System; Client; Implementing the Façade pattern in the real world; The principle of least knowledge; Frequently asked questions; Summary; Chapter 5: The Proxy Pattern
- Controlling Object Access ; Understanding the Proxy design pattern; A UML class diagram for the Proxy pattern; Understanding different types of Proxies; A virtual proxy; A remote proxy; A protective proxy; A smart proxy; The Proxy pattern in the real world; Advantages of the Proxy pattern; Comparing the Façade and Proxy patterns; Frequently asked questions
(source: Nielsen Book Data)
- PMBS (Workshop) (5th : 2014 : New Orleans, La.)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xii, 276 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Section A. Performance benchmarking and optimization ; Algebraic multigrid on a dragonfly network : first experiences on a Cray XC30 / Hormozd Gahvari, William Gropp, Kirk E. Jordan, Martin Schulz, and Ulrike Meier Yang
- Performance evaluation of scientific applications on POWER8 / Andrew V. Adinetz, Paul F. Baumeister, Hans Böttiger, Thorsten Hater, Thilo Maurer, Dirk Pleiter, Wolfram Schenck, and Sebastiano Fabio Schifano
- SPEC ACCEL : a standard application suite for measuring hardware accelerator performance / Guido Juckeland, William Brantley, Sunita Chandrasekaran, Barbara Chapman, Shuai Che, Mathew Colgrove, Huiyu Feng, Alexander Grund, Robert Henschel, Wen-Mei W. Hwu, Huian Li, Matthias S. Müller, Wolfgang E. Nagel, Maxim Perminov, Pavel Shelepugin, Kevin Skadron, John Stratton, Alexey Titov, Ke Wang, Matthijs van Waveren, Brian Whitney, Sandra Wienke, Rengan Xu, and Kalyan Kumaran
- A CUDA implementation of the high performance conjugate gradient benchmark / Everett Phillips and Massimiliano Fatica
- Performance analysis of a high-level abstractions-based hydrocode on future computing systems / G.R. Mudalige, I.Z. Reguly, M.B. Giles, A.C. Mallinson, W.P. Gaudin, and J.A. Herdman
- Section B. Performance analysis and prediction ; Insight into application performance using application-dependent characteristics / Waleed Alkohlani, Jeanine Cook, and Nafiul Siddique
- Roofline model toolkit : a practical tool for architectural and program analysis / Yu Jung Lo, Samuel Williams, Brian Van Straalen, Terry J. Ligocki, Matthew J. Cordery, Nicholas J. Wright, Mary W. Hall, and Leonid Oliker
- Modeling stencil computations on modern HPC architectures / Raúl de la Cruz and Mauricio Araya-Polo
- Performance modeling of the HPCG benchmark / Vladimir Marjanović, José Gracia, and Colin W. Glass
- On the performance prediction of BLAS-based tensor contractions / Elmar Peise, Diego Fabregat-Traver, and Paolo Bientinesi
- Section C. Power, energy and checkpointing ; Assessing general-purpose algorithms to cope with fail-stop and silent errors / Anne Benoit, Aurélien Cavelan, Yves Robert, and Hongyang Sun
- A case for epidemic fault detection and group membership in HPC storage systems / Shane Snyder, Philip Carns, Jonathan Jenkins, Kevin Harms, Robert Ross, Misbah Mubarak, and Christopher Carothers
- Analysis of the tradeoffs between energy and run time for multilevel checkpointing / Prasanna Balaprakash, Leonardo A. Bautista Gomez, Mohamed-Slim Bouguerra, Stefan M. Wild, Franck Cappello, and Paul D. Hovland
- On the energy proportionality of distributed NoSQL data stores / Balaji Subramaniam and Wu-chun Feng.
- ACA (Conference) (11th : 2016 : Weihai, China)
- Singapore : Springer, 2016.
- Description
- Book — 1 online resource (xii, 211 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Processors and circuits
- High performance computing
- GPUs and accelerators
- Cloud and data centers
- Energy and reliability
- Intelligence computing and mobile computing.
- International Conference of Electronic engineering and Information Science (3rd : 2016 : Harbin, China), creator.
- Boca Raton : CRC Press, 2016
- Description
- Book — 1 online resource (832 pages) : illustrations
- Summary
-
- Cover; Half Title; Title Page; Copyright Page; Contents; Preface; Committees; Photocurrent characteristics of organic dye copper phthalocyanine transistors; Current transport mechanism analysis of organic dye copper phthalocyanine thin film transistors; Design of a fast transient response output-capacitorless LDO; Designing a 12 bit pipeline ADC based on the CMOS process; Photoelectric properties of organic pigment zinc phthalocyanine Schottky diodes; On two practical student-oriented auxiliary devices for learner autonomy in English; Digital decimation filter design for Sigma-Delta ADC
- Research on the thermal stability and mechanism of PI/TiO2 nanocomposite filmA fault-tolerant routing algorithm for NoC based on 2D Mesh; 20nm and beyond physical design implementation take PR changes; Research on intelligent control system of greenhouse planting; Mechanical properties and toughening mechanism of Csf/SiC ceramic composites; Establishment of the IOV technology innovation alliances and its influencing factors; Geometry modeling program implementation of virtual surgery systems; The analysis of Gd/Sm-Mn substitution on the phase composition of strontium ferrite
- Fabrication and characteristics analysis of a ZnO thin film transistorA modified non-maximum suppression algorithm; A modified measure for image quality analysis; Combination collaborative filtering recommendation algorithm; Modeling and simulation of extended counting ADC; Numerical simulations for near-field acoustic holographic data extrapolation based on the neural network ELM method; Research on high quality intelligent test paper generation based on a genetic algorithm; Self-tuning descriptor Kalman filter with correlated noise
- An approach based on support vector regression for single-image super-resolutionHand-vein image enhancement based on gradient domain; Hand vein recognition based on reference point and NMI; Trade-off performance analysis for SED scheduling in cognitive radios; A selective diversity cooperative spectrum-sensing algorithm for cognitive radios; An improved image super-resolution reconstruction algorithm based on centralised sparse representation; The research and implementation of impact point testing based on acoustic target sensors
- Research and implementation of camera calibration system for machine vision
- Waschke, Marvin, author.
- [Berkeley, CA] : Apress, [2015]
- Description
- Book — 1 online resource Digital: text file; PDF.
- Summary
-
- PART I. Services, Virtualization, Handhelds, and Clouds
- Chapter 1. The Imperative: IT Integration
- Chapter 2. The Merger: Enterprise Business and IT Management
- Chapter 3. The Bridge: Service Management
- Chapter 4. The Buzz: Handhelds in the Workplace
- Chapter 5. The Hard Part: Clouds PART II. Service Management
- Chapter 6. The Infrastructure: ITIL and Service Management
- Chapter 7. The Superstructure: Service Management Architecture PART III. Enterprise Integration
- Chapter 8. The Harder They Fall: Integration in the Enterprise
- Chapter 9. The Contenders: Enterprise Integration Architectural Patterns PART IV. Virtualization
- Chapter 10. Not in Kansas: Virtualization Challenges
- Chapter 11. Splendid Isolation: Virtual Architecture Patterns PART V. Clouds
- Chapter 12. Slipping the Surly Bonds: Cloud Architecture Patterns
- Chapter 13. Tricky Business: Cloud Integration Patterns
- Chapter 14. Fish nor Fowl: Mixed Architectures
- Chapter 15. Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Wysota, Witold, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
- Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Qt; The cross-platform programming; Qt Platform Abstraction; Supported platforms; A journey through time; New in Qt 5; Restructured codebase; Qt Essentials; Qt Add-ons; Qt Quick 2.0; Meta-objects; C++11 support; Choosing the right license; An open source license; A commercial license; Summary; Chapter 2: Installation; Installing the Qt SDK; Time for action
- installing Qt using an online installer; Setting up Qt Creator.
- Time for action
- loading an example projectTime for action
- running the Affine Transformations project; Building Qt from sources; Time for action
- setting up Qt sources using Git; Time for action
- configuring and building Qt; Summary; Chapter 3: Qt GUI Programming; Windows and dialogs; Creating a Qt project; Time for action
- creating a Qt Desktop project; Adding child widgets to a window; Managing widget content; Time for action
- implementing a tic-tac-toe game board; Qt meta-objects; Signals and slots; Time for action
- functionality of a tic-tac-toe board; Properties.
- Declaring a propertyUsing a property; Time for action
- adding properties to the board class; Designing GUIs; Time for action
- designing the game configuration dialog; Time for action
- polishing the dialog; Accelerators and label buddies; The tab order; Signals and slots; Using designer forms; Direct approach; The multiple-inheritance approach; The single inheritance approach; Time for action
- the logic of the dialog; An application's main window; The Qt resource system; Time for action
- the main window of the application; Time for action
- adding a pull-down menu.
- Time for action
- creating a toolbarTime for action
- filling in the central widget; Time for action
- putting it all together; Summary; Chapter 4: Qt Core Essentials; Text handling; Manipulating strings; Encoding and decoding text; Basic string operations; The string search and lookup; Dissecting strings; Converting between numbers and strings; Using arguments in strings; Regular expressions; Time for action
- a simple quiz game; Extracting information out of a string; Finding all pattern occurrences; Data storage; Files and devices; Traversing directories; Getting access to the basic file.
- DevicesTime for action
- implementing a device to encrypt data; Text streams; Data serialization; Binary streams; Time for action
- serialization of a custom structure; XML streams; Time for action
- implementing an XML parser for player data; JSON files; Time for action
- the player data JSON serializer; Time for action
- implementing a JSON parser; QSettings; Summary; Chapter 5: Graphics with Qt; Raster painting; Painter attributes; Widget painting; Time for action
- custom-painted widgets; Time for action
- transforming the viewport; Time for action
- drawing an oscillogram; Input events.
- Time for action
- making oscillograms selectable.
(source: Nielsen Book Data)
- WWIC (Conference) (15th : 2017 : Saint Petersburg, Russia)
- Cham, Switzerland : Springer, 2017.
- Description
- Book — 1 online resource (xiii, 324 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Network analysis and dimensioning.- Bargaining over Fair Channel Sharing between Wi-Fi and LTE-U Networks.- Time-Dependent SIR Analysis in Shopping Malls Using Fractal-Based Mobility Models.-Analysis and performance evaluation of SDN queue model.- Analysis of a retrial queue with limited processor sharing operating in the random environment.- Stationary Distribution of Waiting Time in MAP/G/1/N Queueing System with LIFO Service Discipline.- 5G communications. -Distributed Sleep Mode Power Control in 5G Ultra Dense Networks.- System Model for Multi-level Cloud Based Tactile Internet System. -Task Scheduling Scheme Based on Cost Optimization in 5G/Hetnets C-RAN.- Energy Efficiency Performance for 5G Cellular Networks.- Network design and planning.- Interaction of the IoT traffic generated by a Smart city segment with SDN core network.- Evaluation of Geocast Routing Trees on Random and Actual Networks.- A NURBS Based Technique for an Optimized Transmit Opportunity Map Processing in WLAN Networks.- Network protocols.- Load-Balancing Adaptive Clustering Refinement Algorithm for Wireless Sensor Network Clusters.- Simulation and Testing of a Platooning Management Protocol Implementation.- Research of Interaction between Applications of Augmented Reality and Control Methods of UAVs.- Energy-efficient Power Control and Clustering in Underlay Device to Multi-Device Communications.- Adaptive-Segmentation and Flexible-Delay Based Broadcasting Protocol For VANETs.-Information technology. -NetFlow Anomaly Detection Though Parallel Cluster Density Analysis in Continuous Time-Series.- Investigation of traffic pattern for the augmented reality applications.- Benefits of Multiply-cascaded TCP Tunnel with Network Coding over Lossy Networks.- Circuit design.- A Broadband Power Amplifier Applied in GSM/TD-SCDMA/WLAN System.- An 8-bit 6GS/s Current Steering DAC with Optimized Current Switch Drive.- IBIS-AMI based PAM4 Signaling and FEC Technique for 25 Gb/s Serial Link.- Spur-free MASH DDSM with Eliminable Dither.- A 20 Gb/s Wireline Receiver with Adaptive CTLE and Half-rate DFE in 0.13 m Technology.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- CWSN (Conference) (8th : 2014 : Xi'an, China)
- Heidelberg : Springer, 2015.
- Description
- Book — 1 online resource (xviii, 701 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Power control and management
- Network architecture and deployment
- Positioning and location-based services in wireless sensor networks
- Security and privacy
- Wireless communication systems and protocols
- Routing algorithm and transport protocols in wireless sensor networks
- Wireless communication protocols and sensor data quality, integrity and trustworthiness
- Internet of Things
- Wireless mobile network architecture, in-vehicle network
- Indoor positioning and location-based services
- Applications of wireless sensor networks.
- CloudComp (Conference) (5th : 2014 : Guilin, China)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (ix, 245 pages) : illustrations
- Summary
-
- A Hybrid Remote Rendering Approach for Graphic Applications on Cloud Computing
- A Policy-based Application Service Management in Mobile Cloud Broker
- Personalized Video Recommendations with Both Historical and New Items
- A VM Reservation-based Cloud Service Broker and Its Performance Evaluation
- Virtualizing IMS Core and its Performance Analysis
- VM3: Virtual Machine Multicast Migration Based on Comprehensive Load Forecasting
- A Phased Workflow Scheduling Scheme with Task Division Policy in Cloud Broker
- An Efficient Data Extracting Method Based on Hadoop
- Based Big Data Analysis of Fraud Detection for Online Transaction Orders
- Question Classification based on Hadoop Platform
- A Dynamic and Static Combined Replication Management Mechanism Based on Frequency Adaptive
- A distributed business process collaboration architecture based on entropy in cloud computing
- DSBAF: Running My Web Services in your WS Environment
- Cloud-based Iterative RFID Tag Search Protocol Using Bloom Filters
- Design and Optimizations of The MD5 Crypt Cracking Algorithm Based on CUDA
- A Model of Cloud Computing Federation Based on Complex Network Theory
- The Implementation of IKEV2 For IPSec.
- International Conference on Mobile Networks and Management (6th : 2014 : Würzburg, Germany)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xii, 458 pages) : illustrations
- Summary
-
- Scalable and Self-Sustained Algorithms for Femtocell Interference Mitigation
- Enhancing Video Delivery in the LTE Wireless Access Using Cross-Layer Mechanisms
- Novel Schemes for Component Carrier Selection and Radio Resource Allocation in LTE-Advanced Uplink
- Optimising LTE Uplink Scheduling by Solving the Multidimensional Assignment Problem
- Virtualization and Software Defined Networking
- SDN and NFV Dynamic Operation of LTE EPC Gateways for Time-varying Traffic Patterns
- Towards a High Performance DNSaaS Deployment Network Configuration In Open Flow Networks A Novel Model for WiMAX Frequency Spectrum Virtualization and Network Federation Mobile Network Architecture evolution options: GW decomposition and Software Defined Networks.
(source: Nielsen Book Data)
- International Conference on Mobile Networks and Management (7th : 2015 : Santander, Spain)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xi, 294 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Cellular Network Management and Self-Organizing Networks
- Techniques and Algorithms for Wireless Networks
- Applications and Services
- Wireless Sensor Networks and IoT Architecures.
18. Global usability [2011]
- London ; New York : Springer, ©2011.
- Description
- Book — 1 online resource (x, 352 pages) : color illustrations
- Summary
-
- Introduction.-Usability in the Developing World.-Issues in Adapting Usability Test Methodology.-Cultural Issues in Online Trust Related to Website Design.-International Ethnographic User Experience Research.-Brazil.-China.-Czech Republic.-India.-Israel.-Japan.-Malaysia.-Mexico.-New Zealand.-Philippines.-Poland.-Russia.-Singapore.-South Korea.-Thailand.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Cham, Switzerland : Springer, [2019]
- Description
- Book — 1 online resource (xxiii, 353 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Foreword.- Preface.- Modeling and Analysis of Resilience for Distribution Networks.- Optimal Scheduling Networked Microgrids to Resilience Enhancement Under Uncertainty.- Multi-Stage Resilient Distribution System Expansion Planning Considering Non-Utility Gas-Fired Distributed Generation.- Power System Flexibility and Resiliency.- Power System Connectivity and Resiliency.- Malicious and Deliberate Attacks and Power System Resiliency.- Resilient Thorough Microgrids.- Power Systems Recovery and Restoration Encounter with Natural Disaster and Deliberate Attacks.- Resilience Enhancement of Cyber-Physical Systems: A Review.- Issues in Securing Critical Infrastructure Networks for Smart Grid Based on Scada, and Other Industrial Control and Communication Systems.- Continuity of Electricity Supply and Specific Indicators.- Resilience Metrics Development for Power Systems.- Resilient Optimal Power Flow with Evolutionary Computation Methods - Short Survey.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Workshop on Parallel Tools for High Performance Computing (10th : 2016 : Stuttgart, Germany)
- Cham, Switzerland : Springer, 2017.
- Description
- Book — 1 online resource Digital: text file; PDF.
- Summary
-
- Preface; Contents; Kerncraft: A Tool for Analytic Performance Modeling of Loop Kernels ; 1 Introduction; 1.1 Related Work; 1.2 Performance Models; 1.2.1 Roofline; 1.2.2 Execution-Cache-Memory; 2 Kerncraft; 2.1 Kernel Code; 2.2 Machine Description; Compute Architecture; Memory Hierarchy; Benchmarks; 2.3 Models; Roofline; ECM; Layer Conditions; Benchmark; 2.4 Cache Miss Prediction; 2.4.1 Cache Simulation with Pycachesim; 2.4.2 Layer Conditions; 2.5 Underlying In-Core Execution Prediction; 3 Kerncraft Usage; 3.1 Single-Core Performance; 3.2 Single-Socket Scaling and Saturation Point.
- 3.3 Layer Conditions4 Future Work; References; Defining and Searching Communication Patterns in Event Graphs Using the g-Eclipse Trace Viewer Plugin; 1 Introduction; 2 Pattern Definition; 3 Pattern Search; 3.1 Pattern Description; 3.2 Execution of the Description; 3.3 Event Sequence Search; Modified Karp-Rabin Algorithm; 3.4 Sequence Dependency Graph; 3.5 Merge of Potential Matches to Pattern Instances; 3.5.1 Constraints for Searching Patterns in Event Graphs; 3.5.2 Dynamic Backtracking; 4 g-Eclipse Trace Viewer Pattern Search Plugin; 5 Examples; 6 Future Work; 7 Conclusion; References.
- Monitoring Heterogeneous Applications with the OpenMP Tools Interface1 Introduction; 2 Related Work; 3 Integration of the OpenMP Tools Interface; 3.1 Integration into the Parallel Runtime; 3.2 Integration into the Monitoring Tool; 4 Experimental Setup; 5 Results; 5.1 OmpSs Runtime Improvements; 6 Conclusions; References; Extending the Functionality of Score-P Through Plugins: Interfaces and Use Cases; 1 Introduction and Related Work; 2 Score-P Overview; 3 The Metric Plugin Interface; 3.1 Metric Design Criteria; 3.2 Calls to Plugins; 3.3 Introduced Overhead; 3.4 Use Case: Uncore Counter.
- 3.5 Use Case: Watchpoints4 The Substrate Plugin Interface; 4.1 Substrates Design Criteria; 4.2 Calls to Plugins; 4.3 Introduced Overhead; 4.4 Use Case: Region-Based Energy Efficiency Tuning; 4.5 Use Case: Balancing-Based Energy Efficiency Tuning; 4.6 Use Case: Event Flow Graphs; 5 Conclusion and Further Work; References; Debugging Latent Synchronization Errors in MPI-3 One-Sided Communication; 1 Introduction; 2 MPI-3 One-Sided Communication Semantics; 2.1 Modeling Memory Consistency; 2.2 Consistency Properties; 3 Uncovering Latent Synchronization Errors; 3.1 Conceptual Overview.
- 3.2 Nasty-MPI Rescheduling Process3.2.1 Completion Stage; 3.2.2 Atomicity Stage; 3.2.3 Reordering Stage; 4 Experimental Evaluation; 4.1 Methodology; 4.2 Nasty-MPI Test Cases; 4.3 Discussion; 5 Related Work; 6 Conclusion and Future Work; References; Trace-Based Detection of Lock Contentionin MPI One-Sided Communication; 1 Introduction; 2 Related Work; 3 Lock Contention; 4 Wait-State Detection; 4.1 The Active-Message Infrastructure; 4.2 Detecting Lock Contention; 5 Results; 5.1 Micro Benchmark; 5.2 SOR; 6 Conclusion and Outlook; References.
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.