The Disc Shop

Computer Talk - Business Computer - Computer Games - Computer Software

Computer Shop - Computer Mice - New Computer - Antivirus Software






Multithreaded Computer Architecture

RRP $157.95

Multithreaded computer architecture has emerged as one of the most promising and exciting avenues for the exploitation of parallelism. This new field represents the confluence of several independent research directions which have united over a common set of issues and techniques. Multithreading draws on recent advances in dataflow, RISC, compiling for fine-grained parallel execution, and dynamic resource management. It offers the hope of dramatic performance increases through parallel execution for a broad spectrum of significant applications based on extensions to `traditional' approaches.
Multithreaded Computer Architecture is divided into four parts, reflecting four major perspectives on the topic. Part I provides the reader with basic background information, definitions, and surveys of work which have in one way or another been pivotal in defining and shaping multithreading as an architectural discipline. Part II examines key elements of multithreading, highlighting the fundamental nature of latency and synchronization. This section presents clever techniques for hiding latency and supporting large synchronization name spaces. Part III looks at three major multithreaded systems, considering issues of machine organization and compilation strategy. Part IV concludes the volume with an analysis of multithreaded architectures, showcasing methodologies and actual measurements.
Multithreaded Computer Architecture: A Summary of the State of the Art is an excellent reference source and may be used as a text for advanced courses on the subject.


Logics In Computer Science

RRP $299.99

In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software designs with respect to a desired behavior. The work is organized in two parts. In the first part two logics for computations, the graded computation tree logic and the computation tree logic with minimal model quantifiers are discussed. These have proved to be useful in describing correct executions of monolithic closed systems. The second part focuses on logics for strategies, strategy logic and memoryful alternating-time temporal logic, which have been successfully applied to formalize several properties of interactive plays in multi-entities systems modeled as multi-agent games.


Communication Networks And Computer Systems

RRP $320.99

Communication networks and computer systems research is entering a new phase in which many of the established models and techniques of the last twenty years are being challenged. The research community is continuing to free itself from past intellectual constraints so that it may fully exploit the convergence of computing and communications. Evaluating the performance of emerging communications and computer systems constitutes a huge challenge. Thus, current research provides a set of heterogeneous tools and techniques embracing the uncertainties of time and space varying environments when the requests for diverse services are made in real time, and with very different quality of service expectations.These novel techniques will lead to fast and economic service deployment and effective dynamic resource management, and hence to new business strategies and infrastructures that will facilitate the emergence of future services and applications.This volume contains contributions and presentations made by leading international researchers at a workshop which was held in April 2004 to honour Professor Erol Gelenbe on the occasion of his inaugural lecture as the Dennis Gabor Chair at Imperial College London.


Development Of A New Inactivated Virus Vaccine

RRP $281.99


Security Of E-systems And Computer Networks

RRP $321.99

E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.



Search

The Disc Shop Articles

Computer Talk Business Computer Computer Games Computer Software
Computer Shop Computer Mice New Computer Antivirus Software
Computer Consulting Home Computer

The Disc Shop Books

Computer Talk Business Computer Computer Games Computer Software
Computer Shop Computer Mice New Computer Antivirus Software
Computer Consulting Home Computer

The Disc Shop