![]() |
X86 Assembly
ISBN: 9783838335537 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book covers assembly language programming for the x86 family of microprocessors. The objective is to teach how to program in x86 assembly, as well as the history and basic architecture of x86 processor family. When referring to x86 we address the complete range of x86-based processors but keep in mind that x86-32 Assembly is commonly referred to as IA-32 (Intel Architecture, 32-bit) Assembly, a 32-bit extension of the original Intel x86 processor architecture. IA-32 has full backwards compatibility (16-bit). AMD64 or AMD 64-bit extension is called x86-64 and is backwards compatible with...
This book covers assembly language programming for the x86 family of microprocessors. The objective is to teach how to program in x86 assembly, as wel...
|
cena:
219,18 |
![]() |
Real-Time Task Scheduling Modeling Using Mixed-Integer Programming
ISBN: 9783838396484 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Priority-driven scheduling of real-time systems has attracted considerable research in the literature. The bulk of the research focuses on attempts to explore scheduling schemes that optimize a particular parameter without meticulous considerations related to the global system's behavior. This work is concerned with the implementation of mathematical programming models developed to substantiate the effectiveness of other models.
Priority-driven scheduling of real-time systems has attracted considerable research in the literature. The bulk of the research focuses on attempts to...
|
cena:
219,18 |
![]() |
Platform-Based Authorization Technologies
ISBN: 9783843363457 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computing platforms - such as Windows operating systems - traditionally support authorization to protect accesses to well-defined persistent objects, e.g., files. Operating system authorization is usually based on the model of Discretionary Access Control (DAC) and is realized via Access Control Lists (ACLs). These mechanisms do not satisfy the needs of applications that process resources at higher levels of abstraction than the operating system. Therefore, Microsoft introduced a new authorization framework - Authorization Manager (AzMan) - which is built on the Role-Based Access Control...
Computing platforms - such as Windows operating systems - traditionally support authorization to protect accesses to well-defined persistent objects, ...
|
cena:
219,18 |
![]() |
Advances in Real Time Task Scheduling
ISBN: 9783844301427 / Angielski / Miękka / 220 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
353,37 |
![]() |
Real-Time Extensions to MINIX
ISBN: 9783843391375 / Angielski / Miękka / 68 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Real time system applications are increasing every day. Real-time systems span from microcontrollers in automobile engines to very complex applications, such as aircraft flight control or process control in manufacturing plants. Failure in meeting the tasks deadlines can lead to catastrophic consequences. Recently, there has been an interest in techniques for developing real-time applications on general- purpose operating systems (GPOSs), like UNIX, MINIX, LINUX etc. With this in view, this work aims at adding real time extensions to the MINIX (Mini-UNIX) system. This work...
Real time system applications are increasing every day. Real-time systems span from microcontrollers in automobile engines to very complex applicati...
|
cena:
219,18 |
![]() |
Fuzzy Uncertainty Models and Algorithms
ISBN: 9783844316476 / Angielski / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the early phase of real-time system design only an approximate idea of the tasks and their characteristics are known. Therefore, uncertainty or impreciseness is associated with the task deadlines and processing times. It is therefore appropriate to use fuzzy numbers to model task deadlines and processing times. The book fulfills this requirement by developing several models and algorithms for fuzzy real-time scheduling using different membership function choices. It also gives task priority algorithms using a new distance measure based fuzzy criteria and considers energy efficient...
In the early phase of real-time system design only an approximate idea of the tasks and their characteristics are known. Therefore, uncertainty or imp...
|
cena:
304,16 |
![]() |
Towards Adaptive Hierarchical Scheduling
ISBN: 9783845408149 / Angielski / Miękka / 104 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hierarchical scheduling provides predictable timing and temporal isolation; two properties desirable in real-time embedded systems. In hierarchically scheduled systems, subsystems should receive a sufficient amount of CPU resources in order to be able to guarantee timing constraints of its internal parts (tasks). In static systems, an exact amount of CPU resource can be allocated to a subsystem. However, in dynamic systems, where execution times of tasks vary considerably during run-time, it is desirable to give a dynamic portion of the CPU given the current load situation. In this thesis we...
Hierarchical scheduling provides predictable timing and temporal isolation; two properties desirable in real-time embedded systems. In hierarchically ...
|
cena:
219,18 |
![]() |
Analysis of Automated Rootkit Detection Methodologies
ISBN: 9783844384833 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software modules behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute...
The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two me...
|
cena:
219,18 |
![]() |
A Parallel Execution Distributed Middleware of Enterprise Applications
ISBN: 9783838336404 / Angielski / Miękka / 108 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A typical enterprise uses a local area network of computers to perform its business. During the off-working hours, the computational capacities of these networked computers are underused or unused. In order to utilize this computational capacity an application has to be recoded to exploit concurrency inherent in a computation which is clearly not possible for legacy applications without any source code. This thesis presents the design an implementation of a distributed middleware which can automatically execute a legacy application on multiple networked computers by parallelizing it. A...
A typical enterprise uses a local area network of computers to perform its business. During the off-working hours, the computational capacities of the...
|
cena:
219,18 |
![]() |
Multitouch Draw A Secret
ISBN: 9783847309819 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Draw A Secret password systems have recently come into vogue, primarily in the role of protecting a users cellular smart phone from external infiltration in lieu of a password. However, these password systems are only enabled for single touch operation; that is to say, a user may only draw one pattern, with only one finger. Brute forcing these passwords thereby becomes trivial in the context of password complexity. This thesis implements a Draw A Secret system utilizing consumer-grade video hardware to collate multiple patterns synchronously and then authenticate the user at a later point....
Draw A Secret password systems have recently come into vogue, primarily in the role of protecting a users cellular smart phone from external infiltrat...
|
cena:
219,18 |
![]() |
TCP Offload through Connection Handoff
ISBN: 9783838314457 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TCP offload is a technique to improve TCP/IP networking performance of a network computer system by moving (parts of) TCP processing from the host processor to the network interface. There are several ways to achieve offload. The typical full offload moves all TCP functionalities to the network interface, and TCP processing is performed exclusively on the network interface. However, when the network interface has limited processing power, full offload creates a bottleneck at the network interface and degrades system performance. In contrast, TCP offload based on connection handoff ...
TCP offload is a technique to improve TCP/IP networking performance of a network computer system by moving (parts of) TCP processing from the host ...
|
cena:
219,18 |
![]() |
Time Management in Partitioned Systems
ISBN: 9783843354073 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Time management is one of the critical modules of safety-critical systems. Applications need strong assurance from the operating system that their hard real-time requirements are met. Applications running on a real-time system request the service of time management in one way or the other. These requests must be handled in a deterministic and accurate way with lower overheads. The three well-known approaches for handling timer requests are tick-based, one-shot and firm timer. Traditionally tick-based has been the most popular approach that relies on periodic interrupt timer, although it has...
Time management is one of the critical modules of safety-critical systems. Applications need strong assurance from the operating system that their har...
|
cena:
263,91 |
![]() |
Task Scheduling for Multiprocessor Systems
ISBN: 9783843361514 / Angielski / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Parallel processing has seen incredible growth with increasingly complex scientific & engg applications coming to their realm.Task scheduling, a key issue for its success,& design of efficient algorithms play a crucial role in it.Due to NP-completeness of the problem research efforts are mainly focussed at heuristic-based approaches to generate near-optimal schedules within reasonable time & resource constraints.Most of the heuristics, however, ignore practical aspect and/or compromise too much on complexity or performance.This monograph provides an in-depth insight into these issues.An...
Parallel processing has seen incredible growth with increasingly complex scientific & engg applications coming to their realm.Task scheduling, a key i...
|
cena:
304,16 |
![]() |
Fault-Tolerant Real-Time Scheduling for Multiprocessor Systems
ISBN: 9783843388740 / Angielski / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Owing to advances in VLSI and other related technologies, real-time systems have come to an age where their presence is being felt in almost every facet of human life.There is a steady rising trend in the fraction of all processors, manufactured worldwide, that find their way to real-time applications. Most of these time and mission critical applications demand reliable processing environment to guarantee error free execution and completion within the respective time deadlines. Scheduling algorithms can provide low-cost solutions to fault-tolerance and graceful performance...
Owing to advances in VLSI and other related technologies, real-time systems have come to an age where their presence is being felt in almost every ...
|
cena:
304,16 |
![]() |
Effectiveness of Tracing in a Multicore Environment
ISBN: 9783845409382 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Debugging in real time is imperative for telecommunication networks with their ever increasing size and complexity. In event of an error or an unexpected crash, debugging the complex systems that controls these networks becomes an insurmountable task. With the help of tracing, it is possible to capture the snapshot of a system at any given point of time. Tracing, in essence, captures the state of the system along with the programs currently running on the system. LTTng is one such tool developed to perform tracing in both kernel space and user space of an application. In this book, we...
Debugging in real time is imperative for telecommunication networks with their ever increasing size and complexity. In event of an error or an unexpec...
|
cena:
263,91 |
![]() |
Operating Systems Security: Linux
ISBN: 9783844334166 / Angielski / Miękka / 52 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The purpose of this book is a comprehensive investigation of the security issues in the Linux Operating System. Linux is an open source and very good operating system. It is frequently used by both individual users and corporate users. The goal of this project is to conduct a thorough understanding of how Linux provides the standard security model known as CIA, or Confidentiality, Integrity, and Availability.
The purpose of this book is a comprehensive investigation of the security issues in the Linux Operating System. Linux is an open source and very good ...
|
cena:
219,18 |
![]() |
Duper Scalar Processor
ISBN: 9783844329490 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This paper proposes an architecture that brings in a new dimension to instruction level parallelism. The operating system in todays machines does all the decision making as to how the instructions in a task can be parallelized by deciding which task gets assigned to which core. The hardware support for exploiting instruction level parallelism is very small and has very little decision making power. Most recently dynamic scheduling of the instructions paved the pathway for major hardware changes and hence the decision making power shared. But the problem still persists. The operating has no...
This paper proposes an architecture that brings in a new dimension to instruction level parallelism. The operating system in todays machines does all ...
|
cena:
219,18 |
![]() |
Fundamentals of Operating Systems
ISBN: 9780333598481 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A revised and updated edition of this student introductory textbook, it has new diagrams and illustrations, with updated hardware examples. A new concluding chapter on graphical user interfaces is added. There is also more emphasis on client-server systems.
A revised and updated edition of this student introductory textbook, it has new diagrams and illustrations, with updated hardware examples. A new conc...
|
cena:
360,83 |
![]() |
NASA Formal Methods: 4th International Symposium, NFM 2012, Norfolk, VA, USA, April 3-5, 2012, Proceedings
ISBN: 9783642288906 / Angielski / Miękka / 466 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Fourth International Symposium on NASA Formal Methods, NFM 2012, held in Norfolk, VA, USA, in April 2012. The 36 revised regular papers presented together with 10 short papers, 3 invited talks were carefully reviewed and selected from 93 submissions. The topics are organized in topical sections on theorem proving, symbolic execution, model-based engineering, real-time and stochastic systems, model checking, abstraction and abstraction refinement, compositional verification techniques, static and dynamic analysis techniques, fault...
This book constitutes the refereed proceedings of the Fourth International Symposium on NASA Formal Methods, NFM 2012, held in Norfolk, VA, USA, in Ap...
|
cena:
201,24 |
![]() |
Erstellen von dynamischen Websites: Einsatz von Webservern & Datenbanken unter Windows CE
ISBN: 9783836653091 / Niemiecki / Miękka / 66 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In dieser Diplomarbeit wird untersucht welche Moglichkeiten Windows CE bietet und welche Webserver und Datenbanken hier zum Einsatz kommen konnen. Dies wird in Anbetracht der Erstellung eines Content-Management-Systemes dargelegt, welches Inhalte mittels dynamisch generierten Webseiten auf einem Windows CE System darstellen soll.
In dieser Diplomarbeit wird untersucht welche Moglichkeiten Windows CE bietet und welche Webserver und Datenbanken hier zum Einsatz kommen konnen. Die...
|
cena:
242,36 |