1 - 20
Next
1. Computer networking and the Internet [2005]
- Halsall, Fred.
- 5th ed. - Harlow : Addison-Wesley, 2005.
- Description
- Book — xxv, 803 p. : ill. ; 24 cm.
- Summary
-
- Chapter 1 Data communications and networking basic 1.1 Overview 1.2 Application and networking terminology 1.2.1 Data types and their characteristics 1.2.2 Data communications and networking terminology 1.2.3 Network types 1.2.4 Network QoS 1.2.5 Application QoS 1.3 Digital communication basics 1.3.1 Transmission media 1.3.2 Transmission control schemes 1.4 rotocol basics 1.4.1Error control 1.4.2 Idle RQ 1.4.3 Continuous RQ 1.4.4 Flow control 1.4.5 Sequence numbers 1.4.6 Layered architecture 1.4.7 Protocol specification 1.4.8 User service primitives 1.4.9 The HDLC protocol 1.5 Protocol stacks 1.5.1The Internet protocol stack Summary Exercises
- Chapter 2 Telephone networks and modems 2.1 Introduction 2.2 Transmission systems 2.2.1 Analog subscriber lines 2.2.2 PSTN modems 2.2.3 Digital subscriber lines 2.2.4 Plesiochronous digital hierarchy 2.2.5 Synchronous digital hierarchy 2.3 Access network signaling 2.3.1 Analog access circuits 2.3.2 ISDN digital access circuits 2.4 Trunk network signaling 2.5 Broadband modems 2.5.1 ADSL 2.5.2 VDSL 2.6 Internet service providers 2.6.1 Home and small office users 2.6.2 Business users 2.6.3 Broadband modems 2.6.4 The PPP link layer protocol 2.6.5 ISP networks and the Internet Summary Exercises
- Chapter 3 Local area networks and intranets 3.1 Introduction 3.2 Ethernet / IEEE 802.3 3.2.1 CSMA/CD 3.2.2 Wiring configurations 3.2.3 Frame format and operational parameters 3.2.4 Frame transmission and reception 3.3 LAN interconnection technologies 3.3.1 Repeater hubs 3.3.2 Bridging hubs 3.3.1 Switching hubs 3.4 High-speed LANs 3.4.1 Fast Ethernet 3.4.2 Switched Fast Ethernet 3.4.3 Gigabit Ethernet 3.5 Virtual LANs 3.5.1 IEEE 802.1Q 3.6 LAN protocols 3.6.1 Physical layer 3.6.2 MAC sublayer 3.6.3 LLC sublayer 3.6.4 Network layer 3.7 Multisite LAN interconnection technologies 3.7.1 Intersite gateways 3.7.2 ISDN switched connections 3.7.3 Frame relay 3.7.4 High bit rate leased lines 3.7.5 Metropolitan area networks Summary Exercises
- Chapter 4 Wireless networks 4.1 Introduction 4.2 Bluetooth 4.2.1 Radio interface 4.2.2 Configuration and terminology 4.2.3 Baseband packet transmissions 4.2 4 Baseband packet formats 4.2.5 Error control 4.2.6 The link manager protocol and establishing a piconet 4.2.7 L2CAP 4.2.8 Service discovery protocol 4.2.9 Protocol stack and application profiles 4.2.10 IEEE 802.15 4.3 Wireless LANs 4.3.1 Wireless media 4.3.2 MAC sublayer protocol 4.4 Cellular radio networks 4.4.1 Functional architecture of GSM 4.4.2 Functional architecture of GSM/GPRS 4.4.3 Functional architecture of UMTS Summary Exercises
- Chapter 5 Entertainment networks 5.1 Introduction 5.2 Cable television networks 5.2.1 HFC networks 5.2.2 Cable modems 5.2.3 MMDS and LMDS 5.2.4 IEEE 802.16 5.3 Satellite television networks 5.3.1 Broadcast television principles 5.3.2 Digital television 5.3.3 Interactive services Summary Exercises
- Chapter 6 The Internet protocol 6.1 Introduction 6.2 IP datagrams 6.3 Fragmentation and reassembly 6.4 IP addresses 6.4.1 Class-based addressing 6.4.2 Subnetting 6.4.3 Classless addressing 6.4.4 Network address translation 6.5 Routing algorithms 6.5.1 Static routing 6.5.2 Flooding 6.5.3 Distance vector routing 6.5.4 Link-state shortest-path-first routing 6.5.5 Tunneling 6.5.6 Broadcast routing 6.6 Routing in the Internet 6.6.1 Internet structure and terminology 6.6.2 ARP and RARP 6.6.3 DHCP 6.6.4 OSPF 6.6.5 BGP 6.6.6 Multicast routing 6.6.7 IGMP 6.6.8 Mbone 6.6.9 ICMP 6.6.10 Mobile IP 6.7 QoS support 6.7.1 Integrated services 6.7.2 Differentiated services 6.7.3 MPLS 6.8 IPv6 6.8.1 Datagram format 6.8.2 Address structure 6.8.3 Extension headers 6.8.4 Autoconfiguration 6.9 IPv6 / IPv4 interoperability 6.9.1 Dual protocols 6.9.2 Dual stacks and tunnelling 6.9.3 Translators Summary Exercises
- Chapter 7 Transport protocols 7.1 Introduction 7.2 TCP / IP protocol suite 7.3 TCP 7.3.1 User service 7.3.2 Protocol operation 7.3.3 Additional features 7.3.4 Protocol specification 7.4 UDP 7.4.1 User services 7.4.2 Protocol operation 7.5 RTP and RTCP 7.5.1 RTP 7.5.2 RTCP 7.6 Wireless TCP 7.6.1 Indirect TCP 7.6.2 Snooping TCP 7.6.3 TCP over cellular radio networks Summary Exercises
- Chapter 8 Internet applications 8.1 Introduction 8.2 Domain name system 8.2.2 DNS resource records 8.2.3 DNS query messages 8.2.4 Name servers 8.2.5 Service requests 8.3 Electronic mail 8.3.1 Structure of e-mail messages 8.3.2 Message content 8.3.3 Message transfer 8.3.4 E-mail gateways 8.4 FTP 8.4.1 Overview 8.4.2 File content representation 8.4.3 FTP operation 8.4.4 Command and reply message format 8.4.5 Example 8.4.6 Anonymous FTP 8.5 TFTP 8.5.1 Protocol 8.6 Internet telephony 8.6.1 SIP 8.6.2 SDP 8.6.3 GLP 8.6.4 H.323 8.7 SNMP 8.7.1 Structure of management information 8.7.2 Protocol Summary Exercises
- Chapter 9 The World Wide Web 9.1 Introduction 9.2 Overview 9.3 URLs and HTTP 9.3.1 URLs 9.3.2 HTTP 9.4 HTML 9.4.1 Text format directives 9.4.2 Lists 9.4.3 Color 9.4.4 Images and lines 9.4.5 Tables 9.4.6 Forms and CGI scripts 9.4.7 Web mail 9.4.8 Frames 9.4.9 Extended HTML 9.5 Java and JavaScript 9.5.1 Java 9.5.2 JavaScript 9.6 Audio and video 9.6.1 Streaming using a Web server 9.6.2 Steaming servers and RTSP 9.7 Wireless Web 9.7.1 WAP 2.0 Summary Exercises
- Chapter 10 Security 10.1 Introduction 10.2 Data encryption 10.2.1 Terminology 10.2.2 Basic techniques 10.2.3 The data encryption standard 10.2.4 IDEA 10.2.5 The RSA algorithm 10.3 Nonrepudiation 10.4 Authentication 10.5 Public key certification authorities 10.6 E-mail privacy 10.7 Network security 10.7.1 IP security 10.7.2 Security in wireless networks 10.8 Web security 10.8.1 SSL 10.8.2 SET Summary Exercises Appendix A Multimedia data representation and compression Appendix B Error detection methods Appendix C Forward error control Appendix D Radio propagation and transmission basics.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.5 .H35 2005 | Available |
2. Handbook of networking & connectivity [1994]
- Boston : AP Professional, ©1994.
- Description
- Book — 1 online resource (xv, 415 pages) : illustrations
- Summary
-
- Enterprise-wide networks: open systems interconnection
- guide to digital communications
- TCP/IP and TN3270. Wide area networks: integrated services digital network
- an overview of the synchronous optical network
- X25 and worldwide networking. Metropolitan area networks: metropolitan area networks
- an overview of the switched multimegabit data service. Local area networks: ethernet/802.3 and Token-Ring/802.5
- local area network cable considerations
- disaster recovery planning for local area networks
- selecting a tape back-up system. Data communications: electronic messaging
- workgroup applications.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Held, Gilbert, 1943-
- 3rd ed. - Chichester ; New York : Wiley, c2000.
- Description
- Book — xvi, 852 p. : ill., map ; 26 cm.
- Summary
-
- Communications in a modern society
- Basic telegraph and telephone operations
- Basic circuit parameters, measurement units and media overview
- Fundamental data transmission concepts
- Terminals, workstations and WAN and LAN networking overview
- Representative standards organizations: the OSI reference model
- The physical layer, cables, connectors, plugs and jacks
- Basic transmission devices: line drivers, modems, and service units
- Regulators and carriers
- Transmission errors: causes, measurements and correction methods
- The WAN data link layer
- Increasing WAN line utilization
- Local area networks
- Basic LAN internetworking
- Digital transmission systems and equipment
- Network architecture
- Packet networks
- Communications software
- Fiber-optic, satellite and wireless terrestrial communications
- Evolving technologies.
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105 .H429 2000 | Available |
- Beck, Michael, 1976-
- New York : McGraw-Hill, 2005.
- Description
- Book — xv, 270 p. : ill. ; 23 cm.
- Summary
-
- IntroductionEFMGeneral ArchitectureThe Short-Reach Solution: 10PASS-TSThe Long-Reach Solution: 2BASE-TLPoint to Point FiberPoint to MultipointOAM for EFMSecurity in the First MileBeyond the First MileAPPENDIX A: EFM
- Objectives, References.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
TK5105.8 .E83 B425 2005 | Available |
5. Proceedings of Workshop on Distributed Computing and Network, 27-28 February 1992, KEK, Tsukuba [1993]
- Workshop on Distributed Computing and Network (1992 : Tsukuba-shi, Japan)
- Tsukuba-shi, Japan : National Laboratory for High Energy Physics, 1993.
- Description
- Book — 285 p. : ill. ; 30 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
QA79.9 .D5 W66 1992 F | Available |
6. Network security : a practical approach [2005]
- Harrington, Jan L.
- Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, ©2005.
- Description
- Book — 1 online resource (xv, 365 pages) : illustrations
- Summary
-
- Chapter 1: In the Beginning
- Chapter 2: Basic Security Architecture
- Chapter 3: Physical Security
- Chapter 4: Information Gathering
- Chapter 5: Gaining and Keeping Root Access
- Chapter 6: Spoofing
- Chapter 7: Denial of Service Attacks
- Chapter 8: Malware
- Chapter 9: User and Password Security
- Chapter 10: Remote Access
- Chapter 11: Wireless Security
- Chapter 12: Encryption Appendix A: The TCP/IP Protocol Stack Appendix B: TCP and UDP Ports Appendix C: Security Update Sites Glossary Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
7. Performance evaluation [1981 -]
- Amsterdam : North-Holland, 1981-
- Description
- Journal/Periodical — volumes : illustrations ; 27 cm
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks
Years (or vols.) after 2007 available online. |
Request (opens in new tab) |
QA76.9 .E94 P4 V.64 NO.6-12 2007 | Available |
QA76.9 .E94 P4 V.64 NO.1-5 2007 | Available |
QA76.9 .E94 P4 V.63 NO.7-12 2006 | Available |
QA76.9 .E94 P4 V.63 NO.1-6 2006 | Available |
QA76.9 .E94 P4 V.62 2005 | Available |
QA76.9 .E94 P4 V.60-61 2005 | Available |
QA76.9 .E94 P4 V.58-59 2004-2005 | Available |
QA76.9 .E94 P4 V.57 2004 | Available |
QA76.9 .E94 P4 V.55-56 2004 | Available |
QA76.9 .E94 P4 V.53-54 2003 | Available |
QA76.9 .E94 P4 V.51-52 2003 | Available |
QA76.9 .E94 P4 V.50 2002 | Available |
QA76.9 .E94 P4 V.48-49 2002 | Available |
QA76.9 .E94 P4 V.46-47 2001-2002 | Available |
QA76.9 .E94 P4 V.44-45 2001 | Available |
QA76.9 .E94 P4 V.42-43 2000-2001 | Available |
QA76.9 .E94 P4 V.40-41 2000 | Available |
QA76.9 .E94 P4 V.38-39 2000 | Available |
QA76.9 .E94 P4 V.35-37 1999 | Available |
QA76.9 .E94 P4 V.33-34 1998 | Available |
QA76.9 .E94 P4 V.31-32 1997-1998 | Available |
QA76.9 .E94 P4 V.29-30 1997 | Available |
QA76.9 .E94 P4 V.27-28 1996 | Available |
QA76.9 .E94 P4 V.26 1996 | Available |
QA76.9 .E94 P4 V.24-25 1995-1996 | Available |
QA76.9 .E94 P4 V.22-23 1995 | Available |
QA76.9 .E94 P4 V.20-21 1994-1995 | Available |
QA76.9 .E94 P4 V.18-19 1993-1994 | Available |
QA76.9 .E94 P4 V.17 1993 | Available |
QA76.9 .E94 P4 V.16 1992 | Available |
QA76.9 .E94 P4 V.15 1992 | Available |
QA76.9 .E94 P4 V.14 1992 | Available |
QA76.9 .E94 P4 V.13 1991 | Available |
QA76.9 .E94 P4 V.12 1991 | Available |
QA76.9 .E94 P4 V.11 1990 | Available |
QA76.9 .E94 P4 V.10 1989 | Available |
QA76.9 .E94 P4 V.9 1988-1989 | Available |
QA76.9 .E94 P4 V.8 1988 | Available |
QA76.9 .E94 P4 V.7 1987 | Available |
QA76.9 .E94 P4 V.6 1986 | Available |
QA76.9 .E94 P4 V.5 1985 | Available |
QA76.9 .E94 P4 V.4 1984 | Available |
QA76.9 .E94 P4 V.3 1983 | Available |
QA76.9 .E94 P4 V.2 1982 | Available |
QA76.9 .E94 P4 V.1 1981 | Available |
- Vibert, Conor, 1962-
- Westport, Conn. : Quorum Books, 2000.
- Description
- Book — 1 online resource (x, 218 pages) Digital: data file.
- Summary
-
- Introduction The Challenge The Power of Search Engines A Theory Identifying Power Holders Appendix: Power at ABC Corporation Performing a Social Responsibility Audit Appendix: Socially Responsible Behavior at Company A Performing Due Diligence Appendix: Due Diligence of Corporation B Profiling Corporate Communication Styles Appendix: Corporate Communications at ITC Spatting Indicators of Organizational Alteration Appendix: Spotting Indicators of Organizational Alteration BuyFromUs Identifying Competitors Concerns for the Future of the Internet: Literacy Development, Technology, and the Workplace The Future: Proactive agent-based CI Appendix: List of Information Portals Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
9. Network : strategies & solutions for the network professional [1997 - 1998]
- Network (San Francisco, Calif. : 1997)
- San Francisco, CA : Miller Freeman, c1997-
- Description
- Journal/Periodical — 2 v. : ill. ; 28 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
For use in Green Library
|
Request (opens in new tab) |
TK5105.7 .L585 V.12:NO.5-9 1997:MAY-SEPT | Available |
10. LAN technology [1989 - 1993]
- Redwood City, CA : M&T Pub., c1989-c1993.
- Description
- Journal/Periodical — 5 v. : ill. ; 28 cm.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
For use in Green Library
|
Request (opens in new tab) |
TK5105 .L585 V.7:NO.10-12,V.9:NO.1-4 | Available |
TK5105 .L585 V.7:NO.1-2,4-9 1991 | Available |
TK5105 .L585 V.6:NO.6-7,9-12 1990 | Available |
TK5105 .L585 V.5:NO.9-V.6:NO.5 1989-1990 | Available |
TK5105 .L585 V.5:NO.1-8 1989:JAN.-AUG | Available |
11. Apache pocket reference [2000]
- Ford, Andrew, 1957 November 30-
- 1st ed. - Sebastopol, CA : O'Reilly, ©2000.
- Description
- Book — 1 online resource (iii, 107 pages)
- Summary
-
- Conventions
- Starting and stopping Apache
- Apache modules
- Directory layout
- Support utilities
- General configuration
- Request processing
- Post-read request phase
- URL translation phase
- Access restrictions
- MIME type checking phase
- Content generation phase
- Request logging phase
- strftime() time formats
- Secure versions of Apache
- CGI environment variables
- Index of Apache directives.
(source: Nielsen Book Data)
- Varghese, George, 1960-
- Amsterdam ; Boston : Morgan Kaufmann, ©2005.
- Description
- Book — 1 online resource (xxiv, 465 pages) : illustrations
- Summary
-
- 1 Introducing Network Algorithmics
- 2 Network Implementation Models
- 3 Fifteen Implementation Principles
- 4 Principles in Action
- 5 Copying Data
- 6 Transfering Control
- 7 Maintaining Timers
- 8 Demultiplexing
- 9 Protocol Processing
- 10 Exact Match Lookups
- 11 Prefix Match Lookups
- 12 Packet Classification
- 13 Switching
- 14 Scheduling Packets
- 15 Routers as Distributed Systems
- 16 Measuring Network Traffic
- 17 Network Security
- 18 Conclusions Appendix A Detailed Models.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Stamp, Mark.
- 2nd ed. - Hoboken, N.J. : Wiley, ©2011.
- Description
- Book — 1 online resource (xxi, 584 pages) : illustrations
- Summary
-
- Preface. About The Author. Acknowledgments. 1 Introduction. 1.1 The Cast of Characters. 1.2 Alice s Online Bank. 1.3 About This Book. 1.4 The People Problem. 1.5 Principles and Practice. 1.6 Problems. I Crypto. 2 Crypto Basics. 2.1 Introduction. 2.2 How to Speak Crypto. 2.3 Classic Crypto. 2.4 Modern Crypto History. 2.5 A Taxonomy of Cryptography. 2.6 A Taxonomy of Cryptanalysis. 2.7 Summary. 2.8 Problems. 3 Symmetric Key Crypto. 3.1 Introduction. 3.2 Stream Ciphers. 3.3 Block Ciphers. 3.4 Integrity. 3.5 Summary. 3.6 Problems. 4 Public Key Crypto. 4.1 Introduction. 4.2 Knapsack. 4.3 RSA. 4.4 Diffie-Hellman. 4.5 Elliptic Curve Cryptography. 4.6 Public Key Notation. 4.7 Uses for Public Key Crypto. 4.8 Public Key Infrastructure. 4.9 Summary. 4.10 Problems. 5 Hash Functions++. 5.1 Introduction. 5.2 What is a Cryptographic Hash Function? 5.3 The Birthday Problem. 5.4 A Birthday Attack. 5.5 Non-Cryptographic Hashes. 5.6 Tiger Hash. 5.7 HMAC. 5.8 Uses for Hash Functions. 5.9 Miscellaneous Crypto-Related Topics. 5.10 Summary. 5.11 Problems. 6 Advanced Cryptanalysis. 6.1 Introduction. 6.2 Enigma. 6.3 RC4 as Used in WEP. 6.4 Linear and Differential Cryptanalysis. 6.5 Lattice Reduction and the Knapsack. 6.6 RSA Timing Attack. 6.7 Summary. 6.8 Problems. II Access Control. 7 Authentication. 7.1 Introduction. 7.2 Authentication Methods. 7.3 Passwords. 7.4 Biometrics. 7.5 Something You Have. 7.6 Two-Factor Authentication. 7.7 Single Sign-On and Web Cookies. 7.8 Summary. 7.9 Problems. 8 Authorization. 8.1 Introduction. 8.2 A Brief History of Authorization. 8.3 Access Control Matrix. 8.4 Multilevel Security Models. 8.5 Compartments. 8.6 Covert Channel. 8.8 CAPTCHA. 8.9 Firewalls. 8.10 Intrusion Detection Systems. 8.11 Summary. 8.12 Problems. III Protocols. 9 Simple Authentication Protocols. 9.1 Introduction. 9.2 Simple Security Protocols. 9.3 Authentication Protocols. 9.4 Authentication and TCP. 9.5 Zero Knowledge Proofs. 9.6 The Best Authentication Protocol? 9.7 Summary. 9.8 Problems. 10 Real-World Security Protocols. 10.1 Introduction. 10.2 SSH. 10.3 SSL. 10.4 IPSec. 10.5 Kerberos. 10.6 WEP. 10.7 GSM. 10.8 Summary. 10.9 Problems. IV Software. 11 Software Flaws and Malware. 11.1 Introduction. 11.2 Software Flaws. 11.3 Malware. 11.4 Botnets. 11.5 Miscellaneous Software-Based Attacks. 11.6 Summary. 11.7 Problems. 12 Insecurity in Software. 12.1 Introduction. 12.2 Software Reverse Engineering. 12.3 Digital Rights Management. 12.4 Software Development. 12.5 Summary. 12.6 Problems. 13 Operating Systems and Security. 13.1 Introduction. 13.2 OS Security Functions. 13.3 Trusted Operating System. 13.4 Next Generation Secure Computing Base. 13.5 Summary. 13.6 Problems. Appendix. A
- -1. Network Security Basics. A
- -2. Math Essentials. Annotated Bibliography. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Albany : State University of New York Press, ©1996.
- Description
- Book — 1 online resource (vi, 319 pages) : illustrations
- Summary
-
- Discourse across links / David Kolb
- Mediated phosphor dots : toward a post-Cartesian model of CMC via the semiotic superhighway / Gary Shank and Donald Cunningham
- Privacy, respect for persons, and risk / Dag Elgesem
- Pseudonyms, mailbots, and virtual letterheads : the evolution of computer-mediated ethics / Peter Danielson
- Intellectual property futures : the paper club and the digital commons / John Lawrence
- Posting in a different voice : gender and ethics in CMC / Susan Herring
- "This is not our fathers' pornography" : sex, lies, and computers / Carol J. Adams
- Power online : a poststructuralist perspective on CMC / Sunh-Hee Yoon
- The political computer : democracy, CMC, and Habermas / Charles Ess
- The unknown god of the Internet : religious communication from the ancient agora to the virtual forum / Stephen D. O'Leary and Brenda E. Brasher
- Sacred text in the sea of texts : the Bible in North American electronic culture / Phil Mullins.
- Berlin ; New York : Springer, ©1996.
- Description
- Book — 1 online resource (xxv, 1040 pages) : illustrations
- Summary
-
- Parallel reservoir simulation based on domain decomposition techniques
- Porting and parallel performance of the industrial CFD code Music
- Parallelisation of an oil reservoir simulation
- Real industrial HPC applications
- Parallelisation of the SWAN surface wave analysis code
- Porting a commercial finite difference time domain Electromagnetic code to a parallel architecture machine
- Porting on parallel platforms of a tool for simulating the effects of lightning strokes on telecommunication buildings: A comparison on preliminary results about performances and accuracy on SIMD and MIMD architectures
- On the use of parallel finite-difference time-domain methods in the modelling of bioelectromagnetic problems
- A comparison of parallel paradigms applied to an industrial code: RADIOSS
- SAMMI: S.A.M.C.E.F. migration onto parallel platforms: Second step
- Experiences and achievements with the parallelization of a large finite element system
- Parallel industrial fluid dynamics and structural mechanics codes
- Towards real CFD simulations on parallel computers in the aeronautic and automotive industry
- Parallel computing for CFD applications in the automotive industry
- First experiences
- Parallelisation and performance evaluation of the aeronautical CFD flow code ESAUNA
- Parallel industrial incompressible CFD calculations with HPCN3S
- Experience with parallel computing for the design of transport aircrafts at Aerospatiale
- Interactive anomaly detection in large transaction history databases
- The system management of the ICL GOLDRUSH parallel database server
- Parallel data mining for very large relational databases
- Decision support for management of parallel database systems
- Parallelization of the GROMOS87 molecular dynamics code: An update
- PULSAR: Parallel noise despeckling of SAR images
- RAPT: A parallel radiotherapy treatment planning code
- Constrained migration of an atmospheric circulation model
- Parallelization of a mesoscale atmospheric transport-chemistry model
- Parallel ocean flow computations on a regular and on an irregular grid
- Experiences with asynchronous parallel molecular dynamics simulations
- Affordable overhead in CORRELATE: Comparing two MD simulators
- Efficiency comparison of data-parallel programming and message-passing paradigm for molecular dynamics simulation
- Parallel Monte Carlo simulation of chemical surface reactions: A case study
- Distributed 2-D molecular dynamics simulation on networked workstations and multiprocessors
- General-purpose parallel computing in a high-energy physics experiment at CERN
- Parallel simulation for High Energy Physics
- Focusing of the pulse modulated radiation of a concentric waveguide array in biological tissues: An investigation made feasible by HPC
- Simulating light scattering from micron-sized particles
- Lattice Boltzmann simulations of electrostatic plasma turbulence
- Parallel turbulence simulation based on MPI
- Experiences with HPF for scientific applications
- Ray Tracing for natural scenes in parallel processors
- Microscopic traffic simulations of road networks using high-performance computers
- Parallel computation of spectral portraits on the meiko CS2
- Active pixel merging on hypercube multicomputers
- Parallel implementation of image reconstruction for the CARABAS long-wave penetrating radar
- COGNITUS
- Fast and reliable recognition of handwritten forms based on vector quantisation
- Pilot-implementation of an aerospace design system into a parallel user simulation environment
- Parallelisation of seismic algorithms using PVM and FORGE
- A parallel library for CFD and other grid-based applications
- Implementation of ECEPP-based programs on the IBM SP2 and the SGI Power Challenge computers
- Parallel simulation environment for polymers, DNA and protein molecular chains
- Prediction of properties of chemical elements and combinations
- A benchmark comparison for suitable HPC platforms to solve electrically large planar conducting structures via a Parallel Method of Moments technique
- Computer simulations for the structure and dynamics of large molecules, clusters and solids
- Simulation of ultrafast nonlinear electro-magnetic phenomena on the basis of Maxwell's equations solutions
- Multilevel parallel solution of large, sparse finite element equations from structural analysis
- BLOWPAC project BLOWmolding modelling by PArallel Computing techniques
- Metacomputing for on-line Stability Analysis in power systems: A proposal
- Metacomputing to solve complex computational problems
- Experiences using the European ATM pilot network
- Particles paradigm and optimization problems
- A parallel genetic algorithm for Automatic Generation of Test Sequences for digital circuits
- Radiographic process simulation by integration of Boltzmann equation on SIMD architecture (Quadrics QH4)
- TGEX: A tool for portable parallel and distributed execution of unstructured problems
- Iteration space partitioning
- A tool for the development of structured parallel applications
- Scotch: A software package for static mapping by dual recursive bipartitioning of process and architecture graphs
- Design and implementation of a general purpose parallel programming system
- Software engineering methods for parallel and distributed scientific computing
- A parallel cellular environment for high performance scientific computing
- Parallel performance evaluation: The medea tool
- Parallelizing for a good node performance
- Simulation of scientific programs on parallel architectures
- A load balancing package for domain decomposition on distributed memory systems
- Load balancing by redundant decomposition and mapping
- Two methods for load balanced distributed adaptive integration
- A new approach for load balancing in high performance decision support systems
- PadFEM: A portable parallel FEM-tool
- A hybrid parallel solver for finite element computations
- The finite difference time domain method on a massively parallel computer
- A parallel implicit compressible multidimensional upwind Euler/Navier-Stokes solver on unstructured meshes
- A multiphysics approach to the direct numerical simulation of turbulent flows on parallel computers
- Adaptive parallel multigrid in computational fluid dynamics
- Block ILP?1 U/(O) preconditioning for a GMRES based Euler/Navier-Stokes solver
- Sequential performance versus scalability: Optimizing parallel LU-decomposition
- Solving traveling salesman problems using a parallel synchronized branch and bound algorithm
- A parallel hot strip mill simulator for testing embedded real-time monitoring systems
- Parallel sparse modified Gram-Schmidt QR decomposition
- Affine data mapping with residual communication optimization: Evaluation of heuristics
- The Remote Computation System
- Conjugate-gradients algorithms on a Cray-T3D
- Semantic computability: A mechanism for the description of test data sets for scaleable information systems
- Intelligent storage devices for scalable information management systems
- Management tools for distributed interoperable environments
- Computational steering
- Image convolutions by quadrics Q1
- "Vipar" libraries to support distribution and processing of visualization datasets
- Bond
- A parallel virtual environment
- Efficient collective communication operations for parallel industrial codes
- Randomized PRAM simulation using T9000 transputers
- Torus-ring-bus connected hierarchic parallel machine
- The impact of communication mechanisms on the performance in a Distributed Virtual Reality System
- Performance prediction and benchmarking: Results from the ALPSTONE project
- ParkBench: Methodology, relations and results
- Evaluation of automatic parallelization strategies for HPF compilers
- Bouclettes: A Fortran loop parallelizer
- Spinning-on-coherency: A new VSM optimisation for write-invalidate
- An RPC facility for PVM
- Debugging massively parallel programs with ATEMPT
- Design level support for parallel and distributed applications
- Sciddle 4.0, or, remote procedure calls in PVM
- LAPACK for Fortran90 compiler
- Realization of an HPF Interface to ScaLAPACK with Redistributions
- Structured parallel programming using MPI
- EC++
- EUROPA parallel C++ a draft definition
- OSSCAR
- Object oriented simulation of slotted communication architectures
- Exploration of emerging HPCN technologies for Web-based distributed computing
- Changing technologies of HPC
- Perspectives for high performance computing in workstation networks
- The back-propagation learning algorithm on the Meiko CS-2: Two mapping schemes
- Parallelization of large scale Industrial Aerodynamic applications on the IBM RS/6000 SP
- Benchmarking an intelligent network prototype implemented in parallel Erlang
- A high-performance data mining server
- Using a distributed shared memory for implementing efficient information mediators
- The design of the IRISS parallel database machine
- Performance evaluation of an advanced radar tracking filter on commercially available parallel computers
- A real-time application on the SP2
- Efficient composition of PVM programs
- Simulation of ATM exchanges on a parallel computer
- Molecular simulation of mixing fluids and microhydrodynamic instabilities
- Computational steering and visualization for multiblock multigrid flow simulations
- Parallel biomolecular simulation: An overview and analysis of important algorithms
- Simulation of high-voltage substations on Parallel Architectures
- Efficient parallel solution of a semiconductor laser array dynamics model
- Network based parallel processing for terrain characterisation on irregularly sampled data
- A parallel algorithm for the optimal power flows problem
- Massively parallel processing (MPP) systems
- Commercial reality or scientific curiosity?
- Financial automate.
- Elahi, Ata, author.
- Cham : Springer, [2014]
- Description
- Book — 1 online resource (viii, 139 pages) : illustrations (some color) Digital: text file; PDF.
- Summary
-
- Preface ; Contents; Chapter-1; Number Systems and Data Communication; 1.1 Introduction; 1.2 Analog Signals; 1.3 Digital Signals; 1.4 Number System; 1.5 Coding Schemes; 1.6 Clock; 1.7 Transmission Modes; 1.8 Transmission Methods; Chapter-2; Logic Gates and Introduction to Computer Architecture; 2.1 Introduction; 2.2 Logic Gates; 2.3 Integrated Circuit (IC) Classification; 2.4 Registers; 2.5 Introduction to Computer Architecture; 2.5.1 Components of a Microcomputer; 2.5.2 CPU Architecture; 2.6 Memory; 2.7 Multiplexer and Decoder; Chapter-3; ARM Instructions Part I; 3.1 Introduction.
- 3.2 Instruction Set Architecture (ISA)3.3 ARM Instructions; 3.3.1 Data Processing Instructions; 3.4 Register Swap Instructions (MOV and MVN); 3.5 Shift and Rotate Instructions; 3.6 ARM Unconditional Instructions and Conditional Instructions; 3.7 ARM Data Processing Instruction Format; 3.8 Stack Operation and Instructions; 3.9 Branch (B) and Branch with Link Instruction (BL); 3.10 Multiply (MUL) and Multiply-Accumulate (MLA) Instructions; Chapter-4; ARM Instructions and Part II; 4.1 ARM Data Transfer Instructions; 4.1.1 Load Instructions (LDR); 4.1.2 ARM Pseudo Instructions.
- 4.1.3 Store Instructions (STR)4.2 ARM Addressing Mode; 4.2.1 Register Indirect Addressing; 4.2.2 Pre-Index Addressing; 4.2.3 Pre-Index Addressing with Auto Index; 4.2.4 Post -Index Addressing; 4.3 Data Transfer Instruction Format; 4.4 Block Transfer Instruction and Instruction Format; 4.5 Swap Memory and Register (SWAP); 4.6 Bits Field Instructions; 4.7 Data Representation and Memory; Chapter-5; ARM Assembly Language Programming Using Keil Development Tools Introduction; 5.1 Introduction; 5.2 Keil Development Tools for ARM Assembly; 5.2.1 Building a Project; 5.2.2 Debugging a Program.
- 5.3 Program Template5.4 Programming Rules; 5.5 Directives; 5.5.1 Data Directive; Chapter-6; ARM Cortex-M3 Processor and MBED NXP LPC1768; 6.1 Introduction; 6.2 MBED NXP LPC1768; 6.3 Basic GPIO Programming; 6.4 Flashing the NXP LPC1768; Chapter-7; Lab Experiments; 7.1 Introduction; 7.2 Lab#1 Binary Counter Using Onboard LEDs; 7.3 La
- b2: Configuring the Real-Time Clock (RTC); 7.4 Lab#3 Configuring Analog-To-Digital Converter (ADC); 7.5 Lab
- #4: Digital to Analog Converter (DAC); 7.6 Experiment
- #5: Binary to Hexadecimal Display; 7.7 Universal Asynchronous Receiver/Transmitter (UART).
17. Security in wireless LANs and MANs [2005]
- Hardjono, Thomas.
- Boston : Artech House, 2005.
- Description
- Book — 1 online resource (xviii, 243 pages) : illustrations Digital: data file.
- Summary
-
- Introduction to Wireless LAN Security. Background: 802.11 Wireless LANs. Over-the-Wire Encryption. TKIP and Michael. 802.11i. Authentication in WLANs. Security in WLAN Roaming. Security in 3G-WLAN Inter-Network Roaming. 80216 WiMax[registered] Security.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Berlin ; New York : Springer-Verlag, ©1992.
- Description
- Book — 1 online resource (xii, 402 pages) : illustrations
- Summary
-
- Workstation support for time-critical applications
- Kernel support for live digital audio and video
- Priority consistency in protocol architectures
- Implementing HeiTS: Architecture and implementation strategy of the Heidelberg High-Speed Transport System
- Protocol support for distributed multimedia applications
- Integrating computing and telecommunications: A tale of two architectures
- Design and applications of a delay jitter control scheme for packet-switching internetworks
- End-to-end synchronization in packet switched networks
- Synchronization of multimedia data streams in open distributed environments
- Multimedia synchronization and UNIX
- Scheduling of bandwidth-constrained multimedia traffic
- Presentation scheduling of multimedia objects and its impact on network and operating system support
- ?-Channel, a network level abstraction to support real-time communication
- The Real-time Channel Administration Protocol
- A continuous media data transport service and protocol for real-time communication in high speed networks
- Design considerations for a Multimedia Network Distribution Center
- Next generation network and operating system requirements for continuous time media
- Dynamicity issues in broadband network computing
- Managing multimedia sessions on a private broadband communication system
- Toolkit support for multiuser audio/video applications
- System support for time-critical applications
- An application framework for multimedia communication
- A programming environment for multimedia applications
- Tools for specifying and executing synchronized multimedia presentations
- Abstractions for continuous-media programming
- Integrated multimedia at Sun Microsystems
- Architectural aspects of multimedia CD-I integration in UNIX/X-Windows workstations
- X-MOVIE: Transmission and presentation of digital movies under X
- Presenting multimedia documents over a digital network
- The CCITT communication protocol for videophone teleconferencing equipment
- FDDI-based digital audio interfaces
- Digital video transmission and the FDDI token ring protocol
- A performance study of forward error correction in ATM networks
- Session XII: Workshop Wrap-Up.
- International Workshop on Network-Embedded Management and Applications (1st : 2010 : Niagara Falls, Ont.)
- New York : Springer, ©2011.
- Description
- Book — 1 online resource (vi, 100 pages) : illustrations (some color)
- Summary
-
- pt. 1. Enablers
- pt. 2. Applications.
- Brown, Paul C.
- Upper Saddle River, N.J. : Addison-Wesley, 2007.
- Description
- Book — 1 online resource Digital: text file.
- Summary
-
- List of Figures xvList of Tables xviiForeword xixPreface xxiPART I. Building Your SOA 1
- Chapter 1: The SOA Challenge 3The Concept of Total Architecture 4 Growing Pressures 6 Framing the Challenges 9 Staying on Track 13 How to Use This Book 16
- Chapter 2: Business Process Pitfalls 19Process Breakdowns Go Undetected 20 Service-Level Agreements Are Not Met 21 Process Changes Do Not Produce Expected Benefits 25 Summary 27 Key Business Process Questions 28 Suggested Reading 28
- Chapter 3: Business Systems Pitfalls 29Where's the Beef? Projects That Don't Deliver Tangible Benefits 30 Systems Won't Perform in Production 32 Summary 34 Key Systems Design Questions 35
- Chapter 4: SOA: More Than Services 37What Is a Service? 37 Creating Effective Services 41 Where Do Services Make Sense? 55 The Economic Realities of Services 58 Summary 59 Key SOA Questions 60 Suggested Reading 61
- Chapter 5: Keys to SOA Success 63What Makes a Project Good? 63 The System Is the Process! 68 System Design and Process Design Are Inseparable 69 Toward a Refined Development Methodology 70 Summary 73 Key Development Process Questions 73 Suggested Reading 74
- Chapter 6: Organizing for SOA Success 75The Organizational Simplicity of Application Design 76The Organizational Complexity of Distributed System Design 78 Organizing Multisilo Projects 80 Project Oversight 88 Organizational Variations for Project Oversight 95 Summary 97 Key Organizational Questions 98 Suggested Reading 98
- Chapter 7: SOA Project Leadership 99The Project Manager 99 The Business Process Architect 101 The Systems Architect 102 Project Leadership Team Responsibilities 103 Organizational Variations for Project Leadership 108 Summary 109 Key Project Leadership Questions 110
- Chapter 8: SOA Enterprise Leadership 111The Elements of Enterprise Architecture 111 Enterprise Architecture Definition 115 Enterprise Architecture Governance 119 Enterprise Architecture Standards and Best Practices 122 Enterprise Architecture Operation 123 Total Architecture Management 124 Summary 128 Key Organizational Questions 129
- Chapter 9: Agile SOA Development 131The Challenge 132 The Solution: Total Architecture Synthesis 134 Manage Risk: Architect as You Go 141 Summary 142 Key Project Lifecycle Questions 142 Suggested Reading 143 PART II. Managing Risk 145
- Chapter 10: Responsibility and Risk in Business Processes 147Systems Can't Take Responsibility 147 The Conversation for Action 149 Delegation and Trust 153 Detecting Breakdowns in Task Performance 154 Dialog Shortcuts Increase Risk 160 Process Design and Responsibility Assignments 170 The Business Executive Sponsor Bears All Risks 178 Summary 179 Key Process Design Questions 181 Suggested Reading 181
- Chapter 11: Managing Project Risk 183The Project as a Dialog 184 The Project Charter 186 Considerations in Structuring Projects 194 Summary 197 Key Project Risk Management Questions 198 Suggested Reading 198
- Chapter 12: Investing Wisely in Risk Reduction 199The Risk of Failure 200 The Risk of Error 208 The Risk of Delay 210 Summary 211 Key Business Process Risk Reduction Questions 212
- Chapter 13: Managing SOA Risks 215Service-Related Risks 215 SOA Processes and Governance 217 Governance for Project Portfolio Planning 218 Governance for Service Design 219 Governance for Service Utilization 224 Governance for Service Operation 225 Summary 226 Key SOA Risk Reduction Questions 227 Afterword 229Index 237.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.