Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Embedded computer systems 31
- Programming 30
- Computer programming 28
- Engineering & Applied Sciences 27
- Application software 23
- Development 22
- Java (Computer program language) 22
- Computer Science 21
- Computer architecture 18
- Computer networks 16
- Parallel programming (Computer science) 15
- Electronic data processing 14
- Data processing 13
- Python (Computer program language) 13
- Database management 12
- Design and construction 12
- Digital techniques 12
- Microprocessors 12
- Programming languages (Electronic computers) 11
- Security measures 11
- z/OS 11
- C++ (Computer program language) 10
- Computer programs 10
- Computers 10
- Examinations 10
- Operating systems (Computers) 10
- Cloud computing 9
- Distributed processing 9
- Microcomputers 9
- Certification 8
-
301Publicado 2021Tabla de Contenidos: “…Directory services -- Security services -- What's Important in a Server -- Scalability -- Reliability -- Availability -- Service and support -- Components of a Server Computer -- Motherboard -- Processor -- Memory -- Hard drives -- Network interfaces -- Video -- Power supply -- Considering Server Form Factors -- Tower case -- Rack mount -- Blade servers -- Considering Virtualization -- Chapter 6 Cloud Computing -- Introducing Cloud Computing -- Looking at the Benefits of Cloud Computing -- Detailing the Drawbacks of Cloud Computing -- Examining Three Basic Kinds of Cloud Services -- Applications -- Platforms -- Infrastructure -- Public Clouds versus Private Clouds -- Introducing Some of the Major Cloud Providers -- Amazon -- Google -- Microsoft -- Getting Into the Cloud -- Book 2 Understanding Network Protocols -- Chapter 1 Network Protocols and Standards -- Understanding Protocols -- Understanding Standards -- Seeing the Seven Layers of the OSI Reference Model -- The physical layer -- The data link layer -- The network layer -- Logical addressing -- Routing -- The transport layer -- The session layer -- The presentation layer -- The application layer -- Following a Packet through the Layers -- The Ethernet Protocol -- Standard Ethernet -- Fast Ethernet -- Gigabit Ethernet -- Beyond gigabit -- The TCP/IP Protocol Suite -- IP -- TCP -- UDP -- Other Protocols Worth Knowing About -- Chapter 2 TCP/IP and the Internet -- What Is the Internet? …”
Libro electrónico -
302
-
303Next generation wireless applications creating mobile applications in a Web 2.0 and Mobile 2.0 worldpor Golding, Paul, 1968-Tabla de Contenidos:
Publicado 2008Libro electrónico -
304Publicado 2022“…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
Video -
305Publicado 2019Tabla de Contenidos: “…5.1 Choosing Algorithmic Components to Work With Compilers and Architectures -- 6 Power Optimization -- 4 Basic Programming Techniques -- 1 Introduction -- 2 Reference Platform Overview -- 2.1 Understanding Hardware -- 3 SDK Installation -- 3.1 Download and Installation -- 3.2 Building a Project -- 3.3 Debugging the Project -- 4 Target System Configuration and Initialization -- 4.1 System Reset -- 4.2 Clock Configuration -- 4.3 I/O Pin Configuration -- 4.4 I/O Pin Initialization -- 4.5 SDK I/O Helper Routines -- 5 Programming Examples -- 5.1 General Purpose I/O-Blinking LED -- 5.2 Basic Serial I/O-Polled UART Send/Receive -- 5.3 Overview of Interrupt Handlers -- 5.4 Basic Timer Operation-Low-Power Timer (LPTMR) -- 6 Summary -- Questions and Answers -- 5 Programming and Implementation Guidelines -- 1 Introduction -- 1.1 Principles of High-Quality Programming -- 1.1.1 Readability -- 1.1.2 Maintainability -- 1.1.3 Testability -- 1.2 What Sets Embedded Apart From General Programming -- 2 Starting the Embedded Software Project -- 2.1 Hardware Platform Input -- 2.2 Project Files/Organization -- 2.2.1 Source Files Written Locally -- 2.2.2 Source Files From Company Libraries -- 2.2.3 Libraries From Third Parties -- 2.2.4 Libraries From Compiler/Linker Toolsets -- 2.3 Team Programming Guidelines -- 2.4 Syntax Standard -- 2.4.1 Code WhiteSpace -- 2.4.2 Tabs in Source Files -- 2.4.3 Alignment Within Source -- 2.5 Safety Requirements in Source Code -- 3 Variable Structure -- 3.1 Variable Declarations -- 3.1.1 Global Variables -- 3.1.2 File-Scope Variables -- 3.1.3 Local Variables -- 3.2 Data Types -- 3.3 Definitions -- 3.3.1 Conditional Compilation -- 3.3.2 #Define -- Content Learning Exercises -- 6 Operating Systems -- 1 Foreground/Background Systems -- 2 Real-Time Kernels…”
Libro electrónico -
306Publicado 2024Tabla de Contenidos: “…11.2.3 Day-to-Day Example -- 11.2.3.1 Optical Character Recognition (OCR) -- 11.2.3.2 Face Recognition -- 11.2.3.3 Recognition of Speech -- 11.2.3.4 Medical Findings -- 11.2.3.5 Extraction of Acquaintance -- 11.2.3.6 Compression -- 11.2.3.7 Additional Examples -- 11.2.4 Discriminant -- 11.2.5 Algorithms -- 11.3 Clustering -- 11.3.1 Data Examples Using Natural Clusters -- 11.4 Clustering (k-means) -- 11.4.1 Outline -- 11.4.2 Example -- 11.4.2.1 Problem -- 11.4.2.2 Solution -- 11.4.3 Some Methods for Initialization -- 11.4.4 Disadvantages -- 11.4.5 Use Case: Image Compression and Segmentation -- 11.4.5.1 Segmentation of Images -- 11.4.5.2 Compression of Data -- 11.5 Reduction of Dimensionality -- 11.5.1 Introduction -- 11.5.1.1 Feature Selection -- 11.5.1.2 Feature Extraction -- 11.5.1.3 Error Measures -- 11.5.2 Benefits of Reducing Dimensionality -- 11.5.3 Subset Selection -- 11.5.3.1 Selecting Forward -- 11.5.3.2 Remarks -- 11.5.3.3 Selection in Reverse -- 11.6 The Ensemble Method -- 11.6.1 Random Forest -- 11.6.2 Algorithm -- 11.6.3 Benefits and Drawbacks -- 11.6.3.1 Benefits -- 11.6.3.2 Drawbacks -- 11.6.4 Deep Learning and Neural Networks -- 11.6.4.1 Definition -- 11.6.4.2 Remarks -- 11.6.5 Applications -- 11.6.6 Artificial Neural Network -- 11.6.6.1 Biological Motivation -- 11.7 Transfer of Learning -- 11.8 Learning Through Reinforcement -- 11.9 Processing of Natural Languages -- 11.10 Word Embeddings -- 11.11 Conclusion -- References -- Chapter 12 Recognition Attendance System Ensuring COVID-19 Security -- 12.1 Introduction -- 12.2 Literature Survey -- 12.3 Software Requirements -- 12.3.1 Operating System - Windows 7 and Above -- 12.3.2 IDE-Visual Studio Code -- 12.3.3 Programming Languages: Python, HTML, CSS, JS, and PHP -- 12.4 Hardware Requirements -- 12.4.1 Three Processors and Above -- 12.4.2 RAM - 2GB (Minimum Capacity)…”
Libro electrónico -
307Publicado 2012Tabla de Contenidos: “…Simultaneous clock and data gate sizing algorithm with common global objective / Gregory Shklover, Ben Emanuel. …”
Libro electrónico -
308por Grout, IanTabla de Contenidos: “…Front Cover; Digital Systems Design with FPGAs and CPLDs; Copyright Page; Table of Contents; Preface; Abbreviations; Chapter 1: Introduction to Programmable Logic; 1.1 Introduction to the Book; 1.2 Electronic Circuits: Analogue and Digital; 1.2.1 Introduction; 1.2.2 Continuous Time versus Discrete Time; 1.2.3 Analogue versus Digital; 1.3 History of Digital Logic; 1.4 Programmable Logic versus Discrete Logic; 1.5 Programmable Logic versus Processors; 1.6 Types of Programmable Logic; 1.6.1 Simple Programmable Logic Device (SPLD); 1.6.2 Complex Programmable Logic Device (CPLD)…”
Publicado 2008
Libro electrónico -
309Publicado 2002“…In this second edition, the book has beensignificantly expanded to include: New chapters on Web site architecture, security,reliability, and their impact on performance Detailed discussion of scalability of Java onmulti-processor servers Perl scripts for writing web performance spidersthat handle logins, cookies, SSL, and more Detailed instructions on how to use Perl DBI andthe open source program gnuplot to generate performance graphs onthe fly Coverage of rstat, a Unix-based open source utilityfor gathering performance statistics remotely In addition, the book includes many more examples and graphs ofreal-world performance problems and their solutions, and has beenupdated for Java 2. …”
Libro electrónico -
310por Hayashi, Kumiko, 1958-Tabla de Contenidos: “…Performance monitoring APIs -- 10.1 The performance status (Perfstat) API -- 10.1.1 Compiling and linking -- 10.1.2 Changing history of perfstat API -- 10.1.3 Subroutines -- 10.2 System Performance Measurement Interface -- 10.2.1 Compiling and linking -- 10.2.2 Terms and concepts for SPMI -- 10.2.3 Subroutines -- 10.2.4 Basic layout of SPMI program -- 10.2.5 SPMI examples -- 10.3 Performance Monitor API -- 10.3.1 Performance Monitor data access -- 10.3.2 Compiling and linking -- 10.3.3 Subroutines -- 10.3.4 PM API examples -- 10.3.5 PMAPI M:N pthreads support -- 10.4 Miscellaneous performance monitoring subroutines -- 10.4.1 Compiling and linking -- 10.4.2 Subroutines -- 10.4.3 Combined example -- Appendix A. …”
Publicado 2005
Libro electrónico -
311Publicado 2018Tabla de Contenidos: “…autovacuum logging -- autovacuum monitoring -- Autovacuum triggering -- Per-table adjustments -- Common vacuum and autovacuum problems -- autovacuum is running even though it was turned off -- autovacuum is constantly running -- Out of memory errors -- Not keeping up with a busy server -- autovacuum is too disruptive -- Long running transactions -- FSM exhaustion -- Recovering from major problems -- Autoanalyze -- Index bloat -- Measuring index bloat -- Detailed data and index page monitoring -- Monitoring query logs -- Basic PostgreSQL log setup -- Log collection -- log_line_prefix -- Multiline queries -- Using syslog for log messages -- CSV logging -- Logging difficult queries -- auto_explain -- Log file analysis -- Normalized query fingerprints -- pg_stat_statements -- pgBadger -- Summary -- Chapter 8: Database Benchmarking -- pgbench default tests -- Table definition -- Scale detection -- Query script definition -- Configuring the database server for pgbench -- Sample server configuration -- Running pgbench manually -- Graphing results with pgbench-tools -- Configuring pgbench-tools -- Customizing for 8.3 -- Sample pgbench test results -- Select-only test -- TPC-B-like test -- Latency analysis -- Sources of bad results and variation -- Developer PostgreSQL builds -- Worker threads and pgbench program limitations -- pgbench custom tests -- Insert speed test -- Transaction Processing Performance Council benchmarks -- Summary -- Chapter 9: Database Indexing -- Indexing example walkthrough -- Measuring query disk and index block statistics -- Running the example -- Sample data setup -- Simple index lookups -- Full table scans -- Index creation -- Lookup with an inefficient index -- Combining indexes -- Switching from indexed to sequential scans -- Planning for plan changes -- Clustering against an index -- Explain with buffer counts…”
Libro electrónico -
312Publicado 2023Tabla de Contenidos: “…-- Throughput costs of compaction -- Long-lived data -- Locality -- Limitations of mark-compact algorithms -- 4. …”
Libro electrónico -
313por Qiu, Robert Caiming, 1966-Tabla de Contenidos: “…-- Preface xv -- 1 Introduction 1 -- 1.1 Vision: “Big Data” 1 -- 1.2 Cognitive Radio: System Concepts 2 -- 1.3 Spectrum Sensing Interface and Data Structures 2 -- 1.4 Mathematical Machinery 4 -- 1.4.1 Convex Optimization 4 -- 1.4.2 Game Theory 6 -- 1.4.3 “Big Data” Modeled as Large Random Matrices 6 -- 1.5 Sample Covariance Matrix 10 -- 1.6 Large Sample Covariance Matrices of Spiked Population Models 11 -- 1.7 Random Matrices and Noncommutative Random Variables 12 -- 1.8 Principal Component Analysis 13 -- 1.9 Generalized Likelihood Ratio Test (GLRT) 13 -- 1.10 Bregman Divergence for Matrix Nearness 13 -- 2 Spectrum Sensing: Basic Techniques 15 -- 2.1 Challenges 15 -- 2.2 Energy Detection: No Prior Information about Deterministic or Stochastic Signal 15 -- 2.2.1 Detection in White Noise: Lowpass Case 16 -- 2.2.2 Time-Domain Representation of the Decision Statistic 19 -- 2.2.3 Spectral Representation of the Decision Statistic 19 -- 2.2.4 Detection and False Alarm Probabilities over AWGN Channels 20 -- 2.2.5 Expansion of Random Process in Orthonormal Series with Uncorrelated Coefficients: The Karhunen-Loeve Expansion 21 -- 2.3 Spectrum Sensing Exploiting Second-Order Statistics 23 -- 2.3.1 Signal Detection Formulation 23 -- 2.3.2 Wide-Sense Stationary Stochastic Process: Continuous-Time 24 -- 2.3.3 Nonstationary Stochastic Process: Continuous-Time 25 -- 2.3.4 Spectrum Correlation-Based Spectrum Sensing for WSS Stochastic Signal: Heuristic Approach 29 -- 2.3.5 Likelihood Ratio Test of Discrete-Time WSS Stochastic Signal 32 -- 2.3.6 Asymptotic Equivalence between Spectrum Correlation and Likelihood Ratio Test 35 -- 2.3.7 Likelihood Ratio Test of Continuous-Time Stochastic Signals in Noise: Selin's Approach 36 -- 2.4 Statistical Pattern Recognition: Exploiting Prior Information about Signal through Machine Learning 39 -- 2.4.1 Karhunen-Loeve Decomposition for Continuous-Time Stochastic Signal 39 -- 2.5 Feature Template Matching 42 -- 2.6 Cyclostationary Detection 47 -- 3 Classical Detection 51.…”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
314Publicado 2014Tabla de Contenidos: “…-- 1.1.1 The Operating System as an Extended Machine -- 1.1.2 The Operating System as a Resource Manager -- 1.2 HISTORY OF OPERATING SYSTEMS -- 1.2.1 The First Generation (1945-55): Vacuum Tubes -- 1.2.2 The Second Generation (1955-65): Transistors and Batch Systems -- 1.2.3 The Third Generation (1965-1980): ICs and Multiprogramming -- 1.2.4 The Fourth Generation (1980-Present): Personal Computers -- 1.2.5 The Fifth Generation (1990-Present): Mobile Computers -- 1.3 COMPUTER HARDWARE REVIEW -- 1.3.1 Processors -- 1.3.2 Memory -- 1.3.3 Disks -- 1.3.4 I/O Devices -- 1.3.5 Buses -- 1.3.6 Booting the Computer -- 1.4 THE OPERATING SYSTEM ZOO -- 1.4.1 Mainframe Operating Systems -- 1.4.2 Server Operating Systems -- 1.4.3 Multiprocessor Operating Systems -- 1.4.4 Personal Computer Operating Systems -- 1.4.5 Handheld Computer Operating Systems -- 1.4.6 Embedded Operating Systems -- 1.4.7 Sensor-Node Operating Systems -- 1.4.8 Real-Time Operating Systems -- 1.4.9 Smart Card Operating Systems -- 1.5 OPERATING SYSTEM CONCEPTS -- 1.5.1 Processes -- 1.5.2 Address Spaces -- 1.5.3 Files -- 1.5.4 Input/Output -- 1.5.5 Protection -- 1.5.6 The Shell -- 1.5.7 Ontogeny Recapitulates Phylogeny -- 1.6 SYSTEM CALLS -- 1.6.1 System Calls for Process Management -- 1.6.2 System Calls for File Management -- 1.6.3 System Calls for Directory Management -- 1.6.4 Miscellaneous System Calls -- 1.6.5 The Windows Win32 API -- 1.7 OPERATING SYSTEM STRUCTURE -- 1.7.1 Monolithic Systems -- 1.7.2 Layered Systems -- 1.7.3 Microkernels -- 1.7.4 Client-Server Model -- 1.7.5 Virtual Machines -- 1.8 THE WORLD ACCORDING TO C -- 1.8.1 The C Language -- 1.8.2 Header Files -- 1.8.3 Large Programming Projects -- 1.8.4 The Model of Run Time -- 1.9 RESEARCH ON OPERATING SYSTEMS…”
Libro electrónico -
315Publicado 2016Tabla de Contenidos: “…7.11.1 Implementing New/Delete Operators with Platform Atomics -- 7.11.2 Promoting New/Delete Returned Address to Global Memory Segment -- 7.11.3 Improve New/Delete Operators Based on Wait API/Signal HSAIL Instruction -- 7.12 Conclusion -- References -- Chapter 8: Application Use Cases -- Platform Atomics -- 8.1 Introduction -- 8.2 Atomics in HSA -- 8.3 Task Queue System -- 8.3.1 Static Execution -- 8.3.2 Dynamic Execution -- 8.3.3 HSA Task Queue System -- 8.3.3.1 A legacy task queue system on GPU -- 8.3.3.2 A simpler, more intuitive implementation with HSA features -- 8.3.4 Evaluation -- 8.3.4.1 An experiment with synthetic input data -- 8.3.4.2 A real-world application experiment: histogram computation -- 8.4 Breadth-First Search -- 8.4.1 Legacy Implementation -- 8.4.2 HSA Implementation -- 8.4.3 Evaluation -- 8.5 Data Layout Conversion -- 8.5.1 In-place SoA-ASTA Conversion with PTTWAC Algorithm -- 8.5.2 An HSA Implementation of PTTWAC -- 8.5.3 Evaluation -- 8.6 Conclusions -- Acknowledgment -- References -- Chapter 9: HSA Simulators -- 9.1 Simulating HSA in Multi2Sim -- 9.1.1 Introduction -- 9.1.2 Multi2Sim - HSA -- 9.1.3 HSAIL Host HSA -- 9.1.3.1 Program entry -- 9.1.3.2 HSA runtime interception -- 9.1.3.3 Basic I/O support -- 9.1.4 HSA Runtime -- 9.1.5 Emulator Design -- 9.1.5.1 Emulator hierarchy -- 9.1.5.2 Memory systems -- 9.1.6 Logging and Debugging -- 9.1.7 Multi2Sim - HSA Road Map -- 9.1.8 Installation and Support -- 9.2 Emulating HSA with HSA emu -- 9.2.1 Introduction -- 9.2.2 Modeled HSA Components -- 9.2.3 Design of HSA emu -- 9.2.4 Multithreaded HSA GPU Emulator -- 9.2.4.1 HSA agent and packet processor -- 9.2.4.2 Code cache -- 9.2.4.3 HSA kernel agent and work scheduling -- 9.2.4.4 Compute unit -- 9.2.4.5 Soft- MMU and soft- TLB -- 9.2.5 Profiling, Debugging and Performance Models -- 9.3 S oft HSA Simulator…”
Libro electrónico -
316
-
317Publicado 2006“…The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. …”
Libro electrónico -
318Publicado 2014“…Customization topics include implementing request and response filters, external data services (EDS), creating custom step processors, and using Content Navigator widgets in other applications. …”
Libro electrónico -
319Publicado 2023Tabla de Contenidos: “…12.3.1.5 Spying -- 12.3.2 Active Attacks -- 12.3.2.1 Denial of Service -- 12.3.2.2 Distributed Denial of Service (DDOS) -- 12.3.2.3 Message Modification -- 12.3.2.4 Masquerade -- 12.3.2.5 Trojans -- 12.3.2.6 Replay Attacks -- 12.3.3 Programming Weapons for the Attackers -- 12.3.3.1 Dormant Phase -- 12.3.3.2 Propagation Phase -- 12.3.3.3 Triggering Phase -- 12.3.3.4 Execution Phase -- 12.4 Recent Cyber Attacks -- 12.5 Drawbacks of Traditional Cryptography -- 12.5.1 Cost and Time Delay -- 12.5.2 Disclosure of Mathematical Computation -- 12.5.3 Unsalted Hashing -- 12.5.4 Attacks -- 12.6 Need of Quantum Cryptography -- 12.6.1 Quantum Mechanics -- 12.7 Evolution of Quantum Cryptography -- 12.8 Conclusion and Future Work -- References -- Chapter 13 Identification of Bacterial Diseases in Plants Using Re-Trained Transfer Learning in Quantum Computing Environment -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Proposed Methodology -- 13.3.1 SVM Classifier -- 13.3.2 Random Forest to Classify the Rice Leaf -- 13.3.2.1 Image Pre-Processing -- 13.3.2.2 Feature Extraction -- 13.3.2.3 Classification -- 13.4 Experiment Results -- Conclusion -- References -- Chapter 14 Quantum Cryptography -- 14.1 Fundamentals of Cryptography -- 14.2 Principle of Quantum Cryptography -- 14.2.1 Quantum vs. …”
Libro electrónico -
320