Sabri Pllana, Linnaeus University, Sweden
Fatos Xhafa, Technical University of Catalonia, Spain
Provides state-of-the-art methods for programming multi-core and many-core systems
The book comprises a selection of twenty two chapters covering: fundamental techniques and algorithms; programming approaches; methodologies and frameworks; scheduling and management; testing and evaluation methodologies; and case studies for programming multi-core and many-core systems.
Program development for multi-core processors, especially for heterogeneous multi-core processors, is significantly more complex than for single-core processors. However, programmers have been traditionally trained for the development of sequential programs, and only a small percentage of them have experience with parallel programming. In the past, only a relatively small group of programmers interested in High Performance Computing (HPC) was concerned with the parallel programming issues, but the situation has changed dramatically with the appearance of multi-core processors on commonly used computing systems. It is expected that with the pervasiveness of multi-core processors, parallel programming will become mainstream.
The pervasiveness of multi-core processors affects a large spectrum of systems, from embedded and general-purpose, to high-end computing systems. This book assists programmers in mastering the efficient programming of multi-core systems, which is of paramount importance for the software-intensive industry towards a more effective product-development cycle.
The book serves as a reference for a larger audience of practitioners, young researchers and graduate level students. A basic level of programming knowledge is required to use this book.
Pervasive Computing: Next Generation Platforms for Intelligent Data Collectionpresents current advances and state-of-the-art work on methods, techniques, and algorithms designed to support pervasive collection of data under ubiquitous networks of devices able to intelligently collaborate towards common goals.
Using numerous illustrative examples and following both theoretical and practical results the authors discuss: a coherent and realistic image of today’s architectures, techniques, protocols, components, orchestration, choreography, and developments related to pervasive computing components for intelligently collecting data, resource, and data management issues; the importance of data security and privacy in the era of big data; the benefits of pervasive computing and the development process for scientific and commercial applications and platforms to support them in this field.
Pervasive computing has developed technology that allows sensing, computing, and wireless communication to be embedded in everyday objects, from cell phones to running shoes, enabling a range of context-aware applications. Pervasive computing is supported by technology able to acquire and make use of the ubiquitous data sensed or produced by many sensors blended into our environment, designed to make available a wide range of new context-aware applications and systems. While such applications and systems are useful, the time has come to develop the next generation of pervasive computing systems. Future systems will be data oriented and need to support quality data, in terms of accuracy, latency and availability.
Pervasive Computing is intended as a platform for the dissemination of research efforts and presentation of advances in the pervasive computing area, and constitutes a flagship driver towards presenting and supporting advanced research in this area.
Indexing: The books of this series are submitted to EI-Compendex and SCOPUSOffers a coherent and realistic image of today’s architectures, techniques, protocols, components, orchestration, choreography, and development related to pervasive computingExplains the state-of-the-art technological solutions necessary for the development of next-generation pervasive data systems, including: components for intelligently collecting data, resource and data management issues, fault tolerance, data security, monitoring and controlling big data, and applications for pervasive context-aware processingPresents the benefits of pervasive computing, and the development process of scientific and commercial applications and platforms to support them in this fieldProvides numerous illustrative examples and follows both theoretical and practical results to serve as a platform for the dissemination of research advances in the pervasive computing area
Topics include:The pros and cons of braced initialization, noexcept specifications, perfect forwarding, and smart pointer make functionsThe relationships among std::move, std::forward, rvalue references, and universal referencesTechniques for writing clear, correct, effective lambda expressionsHow std::atomic differs from volatile, how each should be used, and how they relate to C++'s concurrency APIHow best practices in "old" C++ programming (i.e., C++98) require revision for software development in modern C++
Effective Modern C++ follows the proven guideline-based, example-driven format of Scott Meyers' earlier books, but covers entirely new material.
"After I learned the C++ basics, I then learned how to use C++ in production code from Meyer's series of Effective C++ books. Effective Modern C++ is the most important how-to book for advice on key guidelines, styles, and idioms to use modern C++ effectively and well. Don't own it yet? Buy this one. Now".
-- Herb Sutter, Chair of ISO C++ Standards Committee and C++ Software Architect at Microsoft
Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with Raspberry Pi as its ecosystem continues to develop. This cookbook is ideal for programmers and hobbyists familiar with the Pi through resources, including Getting Started with Raspberry Pi (O’Reilly). Python and other code examples from the book are available on GitHub.Set up your Raspberry Pi and connect to a networkWork with its Linux-based operating systemProgram Raspberry Pi with PythonGive your Pi "eyes" with computer visionControl hardware through the GPIO connectorUse Raspberry Pi to run different types of motorsWork with switches, keypads, and other digital inputsUse sensors to measure temperature, light, and distanceConnect to IoT devices in various waysCreate dynamic projects with Arduino
This book covers the latest advances in structure inference in heterogeneous collections of documents and data. The book brings a comprehensive view of the state-of-the-art in the area, presents some lessons learned and identifies new research issues, challenges and opportunities for further research agenda and developments. The selected chapters cover a broad range of research issues, from theoretical approaches to case studies and best practices in the field.
Researcher, software developers, practitioners and students interested in the field of learning structure and schemas from documents will find the comprehensive coverage of this book useful for their research, academic, development and practice activity.
Interactive Intelligent Systems (IIS) are systems that interact with human beings, media or virtual agents in intelligent computing environments. The emergence of Big Data and the Internet of Things have now opened new opportunities in both academic and industrial research for the successful design and development of intelligent interactive systems. This book explores how novel interactive systems can be used to overcome various challenges and limitations previously encountered by human beings by combining machine learning algorithms and the analysis of recent trends.
The book presents 125 contributions, which have been categorized into seven sections, namely: i) Autonomous Systems; ii) Pattern Recognition and Vision Systems; iii) E-Enabled Systems; iv) Mobile Computing and Intelligent Networking; v) Internet and Cloud Computing; vi) Intelligent Systems, and vii) Various Applications. It not only offers readers extensive theoretical information on Intelligent and Interactive Systems, but also introduces them to various applications in different domains.
Grid Computing originated as a paradigm for high-performance computing, offering an alternative to expensive supercomputers through different forms of large-scale distributed computing, while P2P Computing emerged as a new paradigm after client-server and web-based computing and has shown to be useful in the development of social networking, B2B (Business to Business), B2C (Business to Consumer), B2G (Business to Government), B2E (Business to Employee), and so on. Cloud Computing has been defined as a “computing paradigm where the boundaries of computing are determined by economic rationale rather than technical limits”. Cloud computing has quickly been adopted in a broad range of application domains and provides utility computing at large scale. Lastly, Internet Computing is the basis of any large-scale distributed computing paradigm; it has very rapidly developed into a flourishing field with an enormous impact on today’s information societies, serving as a universal platform comprising a large variety of computing forms such as Grid, P2P, Cloud and Mobile computing.
The aim of the book “Advances on P2P, Parallel, Grid, Cloud and Internet Computing” is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives, and to reveal synergies between these large-scale computing paradigms.
This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time.
The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems.
Indexing: The books of this series are submitted to EI-Compendex and SCOPUSProvides guidelines for anomaly detection, security analysis, and trustworthiness of data processingIncorporates state-of-the-art, multidisciplinary research on online collaborative learning, social networks, information security, learning management systems, and trustworthiness predictionProposes a parallel processing approach that decreases the cost of expensive data processing Offers strategies for ensuring against unfair and dishonest assessmentsDemonstrates solutions using a real-life e-Learning context
It provides a systematic look at the unique characteristics of wireless sensor networks through their usage in a broad range of areas, including healthcare for the elderly, energy consumption, industrial automation, intelligent transportation systems, smart homes and cities, and more.
The book shows how sensor-networks work and how they are applied to monitor our surrounding environment. It explores the most important aspects of modern sensors technologies, providing insights on the newest technologies and the systems needed to operate them.
Readers will find the book to be an entry point for understanding the fundamental differences between the various sensor technologies and their use in for different scenarios.
Indexing: The books of this series are submitted to EI-Compendex and SCOPUSPresents numerous specific use-cases throughout, showing practical applications of conceptsContains contributions from leading experts around the globeCollects, in one place, the latest thinking on an emerging topicAddresses the security and privacy issues inherent in sensor deployment