Browse Results

Showing 25,301 through 25,325 of 54,466 results

Improving Software Testing: Technical and Organizational Developments

by Tim A. Majchrzak

Software is continuously increasing in complexity. Paradigmatic shifts and new development frameworks make it easier to implement software - but not to test it. Software testing remains to be a topic with many open questions with regard to both technical low-level aspects and to the organizational embedding of testing. However, a desired level of software quality cannot be achieved by either choosing a technical procedure or by optimizing testing processes. In fact, it requires a holistic approach.This Brief summarizes the current knowledge of software testing and introduces three current research approaches. The base of knowledge is presented comprehensively in scope but concise in length; thereby the volume can be used as a reference. Research is highlighted from different points of view. Firstly, progress on developing a tool for automated test case generation (TCG) based on a program's structure is introduced. Secondly, results from a project with industry partners on testing best practices are highlighted. Thirdly, embedding testing into e-assessment of programming exercises is described.

Improving Soil Fertility Recommendations in Africa using the Decision Support System for Agrotechnology Transfer (DSSAT)

by Andre Bationo Gerrit Hoogenboom Job Kihara Ramadjita Tabo Dougbedji Fatondji James W Jones

The book gives a detailed description of the application of DSSAT in simulating crop and soil processes within various Agro-ecological zones in Africa. The book, an output of a series of 3 workshops, provides examples of the application of DSSAT models to simulate nitrogen applications, soil and water conservation practices including effects of zai technology, phosphorus and maize productivity, generation of genetic coefficients, long-term soil fertility management technologies in the drylands, microdosing, optimization of nitrogen x germplasms x water, spatial analysis of water and nutrient use efficiencies and, tradeoff analysis. The minimum dataset requirements for DSSAT is discussed. This book arises from attempts to address the limited use of models in decision support by African agricultural (both soil scientist and agronomists) scientists.

Improving Technology Through Ethics (SpringerBriefs in Applied Sciences and Technology)

by Simona Chiodo David Kaiser Julie Shah Paolo Volonté

This book deals with the ethics of technology and addresses specific ethical problems related to some emerging technologies, mainly in the field of computer science (from machine learning models to extracting value from data to human–robot interaction). The contributions are authored mainly by scholars in ICT and other engineering fields who reflect on ethical and societal issues emerging from their own research activity. Thus, rather uniquely, the work overcomes the traditional divide between pure ethical theory that disregards what practitioners do and mere R&D practice that ignores what theorists conceptualize. Conversely, the reader is enabled to understand what ethics means when it is actually put into work by engineering researchers. The book arises from a joint program between MIT and Politecnico di Milano aimed at training early career researchers in addressing the ethical issues of technology and critically reflecting on the social impacts of the emerging, and even disruptive, technologies they are currently developing through their novel research. Overall, it aims at spreading the task of developing technologies that, from the beginning, are designed to be responsible for human life, society, and nature.

Improving the Air Force Scientific Discovery Mission: A Workshop Report

by Committee on Improving the Air Force Scientific Discovery Mission: Leveraging Best Practices in Basic Research Management: A Workshop

In 2015, the Air Force Studies Board conducted a workshop, consisting of two data-gathering sessions, to review current research practices employed by the Air Force Office of Scientific Research (AFOSR). Improving the Air Force Scientific Discovery Mission summarizes the presentations and discussions of these two sessions. This report explores the unique drivers associated with management of a 6. 1 basic research portfolio in the Department of Defense and investigates current and future practices that may further the effective and efficient management of basic research on behalf of the Air Force

Improving the Performance of Wireless LANs: A Practical Guide

by Nurul Sarkar

While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical

Improving the Quality of ABAP Code: Striving for Perfection

by Paul David Hardy

Gain an in-depth understanding of the large number of common problems found in ABAP programs and have a robust methodology for fixing problems when you find them. This book also shows you how to prevent them from occurring in new programs.A large chunk of the world’s biggest organizations use SAP software and virtually all of them have very large amounts of custom code. However, a lot of that custom code is not as good as it could be. In this book we look at why object-oriented programming is the basic building block for improved program quality and at the test-driven development that this enables. We cover the three pillars of clarity, stability, and high performance on which a high-quality ABAP program stands. You will then move on to the user interface, which needs its own set of standards for high quality. In the final chapters, you will learn about specialist topics such as user exits, making sure code will run on the latest releases of SAP, and how to add your own automated custom code quality checks. What You Will Learn Know why object-oriented programming and test-driven development are the cornerstones of high-quality custom code Ensure that the three pillars of clarity, stability, and high performance are fulfilled Make sure your applications are user friendlyEnsure that your custom code works on newer SAP releasesCreate your own custom code quality checks Who This Book Is ForABAP developers who started yesterday or have been programming for 20 years

Improving the Test Process

by Erik Van Veenendaal Graham Bath

This book covers the syllabus for the Improving the Test Process module of the International Software Testing Qualifications Board (ISTQB) Expert Level exam. To obtain certification as a professional tester at the Expert Level, candidates may choose to take a course given by an ISTQB accredited training provider and then sit for the exam. Experience shows that many candidates who choose this path still require a reference book that covers the course. There are also many IT professionals who choose self-study as the most appropriate route toward certification. This book can be used both as a preparation guide for those planning to take the ISTQB Expert Level certification exam and as a practical guide for experienced testing professionals who want to develop their skills in improving test processes.

Improving Web Application Security: Threats and Countermeasures

by Microsoft Corporation

Gain a solid foundation for designing, building, and configuring security-enhanced, hack-resistant Microsoft® ASP.NET Web applications. This expert guide describes a systematic, task-based approach to security that can be applied to both new and existing applications. It addresses security considerations at the network, host, and application layers for each physical tier--Web server, remote application server, and database server--detailing the security configurations and countermeasures that can help mitigate risks. The information is organized into sections that correspond to both the product life cycle and the roles involved, making it easy for architects, designers, and developers to find the answers they need. All PATTERNS & PRACTICES guides are reviewed and approved by Microsoft engineering teams, consultants, partners, and customers--delivering accurate, real-world information that's been technically validated and tested.

Improving your C# Skills: Solve modern challenges with functional programming and test-driven techniques of C#

by Ovais Mehboob Ahmed Khan John Callaway Clayton Hunt Rod Stephens

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.Key FeaturesUnderstand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPIDevelop a containerized application based on microservices architectureGain insights into memory management techniques in .NET CoreBook DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products:C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed KhanPractical Test-Driven Development using C# 7 by John Callaway, Clayton HuntThe Modern C# Challenge by Rod StephensWhat you will learnMeasure application performance using BenchmarkDotNetLeverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operationsModify a legacy application to make it testableUse LINQ and PLINQ to search directories for files matching patternsFind areas of polygons using geometric operationsRandomize arrays and lists with extension methodsUse cryptographic techniques to encrypt and decrypt strings and filesWho this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit

by Gilberto Najera-Gutierrez Juned Ahmed Ansari Daniel Teixeira Abhinav Singh

Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features Gain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali Linux Book Description Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al What you will learn Build and analyze Metasploit modules in Ruby Integrate Metasploit with other penetration testing tools Use server-side attacks to detect vulnerabilities in web servers and their applications Explore automated attacks such as fuzzing web applications Identify the difference between hacking a web application and network hacking Deploy Metasploit with the Penetration Testing Execution Standard (PTES) Use MSFvenom to generate payloads and backdoor files, and create shellcode Who this book is for This Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.

Improving Your Splunk Skills: Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights

by James D. Miller Paul R. Johnson Josh Diakun Derek Mock

Transform machine-generated data into valuable business insights using the powers of Splunk Key Features Explore the all-new machine learning toolkit in Splunk 7.x Tackle any problems related to searching and analyzing your data with Splunk Get the latest information and business insights on Splunk 7.x Book Description Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through this Learning Path, you'll implement new services and utilize them to quickly and efficiently process machine-generated big data. You'll begin with an introduction to the new features, improvements, and offerings of Splunk 7. You'll learn to efficiently use wildcards and modify your search to make it faster. You'll learn how to enhance your applications by using XML dashboards and configuring and extending Splunk. You'll also find step-by-step demonstrations that'll walk you through building an operational intelligence application. As you progress, you'll explore data models and pivots to extend your intelligence capabilities. By the end of this Learning Path, you'll have the skills and confidence to implement various Splunk services in your projects. This Learning Path includes content from the following Packt products: Implementing Splunk 7 - Third Edition by James Miller Splunk Operational Intelligence Cookbook - Third Edition by Paul R Johnson, Josh Diakun, et al What you will learn Master the new offerings in Splunk: Splunk Cloud and the Machine Learning Toolkit Create efficient and effective searches Master the use of Splunk tables, charts, and graph enhancements Use Splunk data models and pivots with faster data model acceleration Master all aspects of Splunk XML dashboards with hands-on applications Apply ML algorithms for forecasting and anomaly detection Integrate advanced JavaScript charts and leverage Splunk's API Who this book is for This Learning Path is for data analysts, business analysts, and IT administrators who want to leverage the Splunk enterprise platform as a valuable operational intelligence tool. Existing Splunk users who want to upgrade and get up and running with Splunk 7.x will also find this book useful. Some knowledge of Splunk services will help you get the most out of this Learning Path.

In 7 Schritten Zur Gründung Eines Online-Unternehmens (Financial Investments #1)

by Tolga Cakir

Die Gründung eines Online-Unternehmens ist ein großes Unterfangen. Um Ihnen diese große Aufgabe zu erleichtern, ist sie in diesem Buch in sieben logische Schritte unterteilt, von denen sich viele auf das konzentrieren, was Sie tun müssen, sobald Sie Ihre Seite eingerichtet haben und sie läuft. Weitere Informationen erläutern die Besonderheiten von Buchhaltungssoftware, den Kauf und Verkauf von Anzeigen auf Websites und vieles mehr. Die ersten Schritte sind immer die schwersten. Wenn Sie erst einmal so weit sind, werden Sie feststellen, dass die Dinge viel einfacher werden und dass der Erfolg in Ihrem Unternehmen nicht nur ein Traum ist, sondern eine reale Möglichkeit, vorausgesetzt, Sie gehen die Dinge auf die richtige Weise an!

In Athena's Camp

by John Arquilla David Ronfeldt

The information revolution--which is as much an organizational as a technological revolution--is transforming the nature of conflict across the spectrum: from open warfare, to terrorism, crime, and even radical social activism. The era of massed field armies is passing, because the new information and communications systems are increasing the lethality of quite small units that can call in deadly, precise missile fire almost anywhere, anytime. In social conflicts, the Internet and other media are greatly empowering individuals and small groups to influence the behavior of states. Whether in military or social conflicts, all protagonists will soon be developing new doctrines, strategies, and tactics for swarming their opponents--with weapons or words, as circumstances require. Preparing for conflict in such a world will require shifting to new forms of organization, particularly the versatile, hardy, all-channel network. This shift will prove difficult for states and professional militaries that remain bastions of hierarchy, bound to resist institutional redesign. They will make the shift as they realize that information and knowledge are becoming the key elements of power. This implies, among other things, that Mars, the old brute-force god of war, must give way to Athena, the well-armed goddess of wisdom. Accepting Athena as the patroness of this information age represents a first step not only for preparing for future conflicts, but also for preventing them.

In Camera: Perfect Pictures Straight Out Of The Camera

by Gordon Laing

With amazing low-light capabilities, incredible definition, intelligent autofocus and a host of other features, digital cameras have now become so powerful that they have left their users behind. Most photographers can take competent shots in a range of conditions, or fix imperfect exposures in Photoshop or Lightroom, but very few have the skill to push their cameras to the limit and capture the perfect shot, under all conditions, with no post-processing required.In Camera is the perfect way to take your photography to that level; to master your camera, understand light, exposure and composition, and make amazing photographs, whatever your camera, without cheating after the event. One hundred of Gordon's beautiful photos are given with his own expert commentary; full settings and camera details are included, and a host of tips and tricks let photographers of any level learn something from every example. The shots are taken with a wide range of cameras, and the emphasis is on getting results by improving your own skills, not wasting money on expensive equipment.

In Camera: How to Get Perfect Pictures Straight Out of the Camera

by Gordon Laing

With amazing low-light capabilities, incredible definition, intelligent autofocus and a host of other features, digital cameras have now become so powerful that they have left their users behind. Most photographers can take competent shots in a range of conditions, or fix imperfect exposures in Photoshop or Lightroom, but very few have the skill to push their cameras to the limit and capture the perfect shot, under all conditions, with no post-processing required.In Camera is the perfect way to take your photography to that level; to master your camera, understand light, exposure and composition, and make amazing photographs, whatever your camera, without cheating after the event. One hundred of Gordon's beautiful photos are given with his own expert commentary; full settings and camera details are included, and a host of tips and tricks let photographers of any level learn something from every example. The shots are taken with a wide range of cameras, and the emphasis is on getting results by improving your own skills, not wasting money on expensive equipment.

In Defence of Open Society: The Legendary Philanthropist Tackles the Dangers We Must Face for the Survival of Civilisation

by George Soros

George Soros is among the world's most prominent public figures. He is one of the history's most successful investors and his philanthropy, led by the Open Society Foundations, has donated over $14 billion to promote democracy and human rights in more than 120 countries. But in recent years, Soros has become the focus of sustained right-wing attacks in the United States and around the world based on his commitment to open society, progressive politics and his Jewish background. In this brilliant and spirited book, Soros offers a compendium of his philosophy, a clarion call-to-arms for the ideals of an open society: freedom, democracy, rule of law, human rights, social justice, and social responsibility as a universal idea. In this age of nationalism, populism, anti-Semitism, and the spread of authoritarian governments, Soros's mission to support open societies is as urgent as it is important.

In Defence of Serendipity

by Seb Olma

In Defence of Serendipity is a lively and buccaneering work of investigative philosophy, treating the origins of "serendipity, accident and sagacity", both as riddles and philosophical concepts that can be put to a future political use. Taking in Aristotle, LSD, Tony Blair and techno-mysticism, Olma challenges the prevailing faith in the benevolence of digital technology and the illegitimate equation of innovation and entrepreneurship, arguing instead that we must take responsibility for the care of society's digital infrastructure, and prevent its degeneration into an apparatus of marketing and finance. For although there is nothing wrong with marketing and finance per se, if they alone lead technological development, free of any discretionary political interference, the freedom to be exploited will be as much a part of the future as our ability to intervene freely in our lives, will be a thing of the past.

In Defense of Elitism: Why I'm Better Than You and You're Better Than Someone Who Didn't Buy This Book

by Joel Stein

From Thurber finalist and former star TIME columnist Joel Stein comes a "brilliant exploration" (Walter Isaacson) of America's political culture war and a hilarious call to arms for the elite."I can think of no one more suited to defend elitism than Stein, a funny man with hands as delicate as a baby full of soft-boiled eggs."--Jimmy Kimmel, host of Jimmy Kimmel Live!The night Donald Trump won the presidency, our author Joel Stein, Thurber Prize finalist and former staff writer for Time Magazine, instantly knew why. The main reason wasn't economic anxiety or racism. It was that he was anti-elitist. Hillary Clinton represented Wall Street, academics, policy papers, Davos, international treaties and the people who think they're better than you. People like Joel Stein. Trump represented something far more appealing, which was beating up people like Joel Stein. In a full-throated defense of academia, the mainstream press, medium-rare steak, and civility, Joel Stein fights against populism. He fears a new tribal elite is coming to replace him, one that will fend off expertise of all kinds and send the country hurtling backward to a time of wars, economic stagnation and the well-done steaks doused with ketchup that Trump eats. To find out how this shift happened and what can be done, Stein spends a week in Roberts County, Texas, which had the highest percentage of Trump voters in the country. He goes to the home of Trump-loving Dilbert cartoonist Scott Adams; meets people who create fake news; and finds the new elitist organizations merging both right and left to fight the populists. All the while using the biggest words he knows.

An In-Depth Guide to Mobile Device Forensics

by Chuck Easttom

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

In-Game: From Immersion to Incorporation

by Gordon Calleja

An investigation of what makes digital games engaging to players and a reexamination of the concept of immersion.Digital games offer a vast range of engaging experiences, from the serene exploration of beautifully rendered landscapes to the deeply cognitive challenges presented by strategic simulations to the adrenaline rush of competitive team-based shoot-outs. Digital games enable experiences that are considerably different from a reader's engagement with literature or a moviegoer's experience of a movie. In In-Game, Gordon Calleja examines what exactly it is that makes digital games so uniquely involving and offers a new, more precise, and game-specific formulation of this involvement. One of the most commonly yet vaguely deployed concepts in the industry and academia alike is immersion—a player's sensation of inhabiting the space represented onscreen. Overuse of this term has diminished its analytical value and confused its meaning, both in analysis and design. Rather than conceiving of immersion as a single experience, Calleja views it as blending different experiential phenomena afforded by involving gameplay. He proposes a framework (based on qualitative research) to describe these phenomena: the player involvement model. This model encompasses two constituent temporal phases—the macro, representing offline involvement, and the micro, representing moment-to-moment involvement during gameplay—as well as six dimensions of player involvement: kinesthetic, spatial, shared, narrative, affective, and ludic. The intensified and internalized experiential blend can culminate in incorporation—a concept that Calleja proposes as an alternative to the problematic immersion. Incorporation, he argues, is a more accurate metaphor, providing a robust foundation for future research and design.

The In-House Option: Professional Issues of Library Automation (Routledge Library Editions: Library and Information Science #47)

by T. D. Webb

This book, first published in 1987, expertly addresses the impact of automation on the profession of librarianship in terms of its practitioners, standards, and underlying philosophy. In clear and understandable language, it focuses - with practical examples - on the important decision of the location of the computer - at the library site or a remote automation centre. Designed to be a practical guide to host computer location, this articulate book also addresses the broad professional issues of library automation.

The In-House Option: Professional Issues of Library Automation (Routledge Library Editions: Library And Information Science Ser. #47)

by Terry D Webb

Here is a timely book that expertly addresses the current impact of automation on the profession of librarianship in terms of its practitioners, standards, and underlying philosophy. In clear and understandable language, author T. D. Webb focuses his discussion--with practical examples--on the important decision of the location of the computer--at the library site or a remote automation center. Designed to be a practical guide to host computer location, this articulate book also addresses the broad professional issues of library automation.

In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data

by Matthew Topol Wes McKinney

Process tabular data and build high-performance query engines on modern CPUs and GPUs using Apache Arrow, a standardized language-independent memory format, for optimal performanceKey FeaturesLearn about Apache Arrow's data types and interoperability with pandas and ParquetWork with Apache Arrow Flight RPC, Compute, and Dataset APIs to produce and consume tabular dataReviewed, contributed, and supported by Dremio, the co-creator of Apache ArrowBook DescriptionApache Arrow is designed to accelerate analytics and allow the exchange of data across big data systems easily.In-Memory Analytics with Apache Arrow begins with a quick overview of the Apache Arrow format, before moving on to helping you to understand Arrow's versatility and benefits as you walk through a variety of real-world use cases. You'll cover key tasks such as enhancing data science workflows with Arrow, using Arrow and Apache Parquet with Apache Spark and Jupyter for better performance and hassle-free data translation, as well as working with Perspective, an open source interactive graphical and tabular analysis tool for browsers. As you advance, you'll explore the different data interchange and storage formats and become well-versed with the relationships between Arrow, Parquet, Feather, Protobuf, Flatbuffers, JSON, and CSV. In addition to understanding the basic structure of the Arrow Flight and Flight SQL protocols, you'll learn about Dremio's usage of Apache Arrow to enhance SQL analytics and discover how Arrow can be used in web-based browser apps. Finally, you'll get to grips with the upcoming features of Arrow to help you stay ahead of the curve.By the end of this book, you will have all the building blocks to create useful, efficient, and powerful analytical services and utilities with Apache Arrow.What you will learnUse Apache Arrow libraries to access data files both locally and in the cloudUnderstand the zero-copy elements of the Apache Arrow formatImprove read performance by memory-mapping files with Apache ArrowProduce or consume Apache Arrow data efficiently using a C APIUse the Apache Arrow Compute APIs to perform complex operationsCreate Arrow Flight servers and clients for transferring data quicklyBuild the Arrow libraries locally and contribute back to the communityWho this book is forThis book is for developers, data analysts, and data scientists looking to explore the capabilities of Apache Arrow from the ground up. This book will also be useful for any engineers who are working on building utilities for data analytics and query engines, or otherwise working with tabular data, regardless of the programming language. Some familiarity with basic concepts of data analysis will help you to get the most out of this book but isn't required. Code examples are provided in the C++, Go, and Python programming languages.

In-Memory Computing: Synthesis and Optimization

by Saeideh Shirinzadeh Rolf Drechsler

This book describes a comprehensive approach for synthesis and optimization of logic-in-memory computing hardware and architectures using memristive devices, which creates a firm foundation for practical applications. Readers will get familiar with a new generation of computer architectures that potentially can perform faster, as the necessity for communication between the processor and memory is surpassed. The discussion includes various synthesis methodologies and optimization algorithms targeting implementation cost metrics including latency and area overhead as well as the reliability issue caused by short memory lifetime.Presents a comprehensive synthesis flow for the emerging field of logic-in-memory computing;Describes automated compilation of programmable logic-in-memory computer architectures;Includes several effective optimization algorithm also applicable to classical logic synthesis;Investigates unbalanced write traffic in logic-in-memory architectures and describes wear leveling approaches to alleviate it.

In-Memory-Computing: Synthese und Optimierung

by Saeideh Shirinzadeh Rolf Drechsler

Dieses Buch beschreibt einen umfassenden Ansatz für die Synthese und Optimierung von Logic-in-Memory-Computing-Hardware und -Architekturen mit memristiven Bauelementen, der eine solide Grundlage für praktische Anwendungen schafft. Die Leser werden mit einer neuen Generation von Computerarchitekturen vertraut gemacht, die potenziell schneller arbeiten können, da die Notwendigkeit der Kommunikation zwischen Prozessor und Speicher überwunden wird. Die Diskussion umfasst verschiedene Synthesemethoden und Optimierungsalgorithmen, die auf Implementierungskostenmetriken wie Latenzzeit und Flächen abzielen, sowie das Problem der Zuverlässigkeit, das durch die kurze Lebensdauer des Speichers verursacht wird. Präsentiert einen umfassenden Synthesefluss für das aufkommende Feld des Logic-in-Memory-Computings; Beschreibt die automatische Kompilierung von programmierbaren Logik-in-Memory-Computerarchitekturen; Enthält mehrere effektive Optimierungsalgorithmen, die auch auf die klassische Logiksynthese anwendbar sind; Untersucht den unausgewogenen Schreibverkehr in Logic-in-Memory-Architekturen und beschreibt Ansätze zum Verschleißausgleich, um diesen zu verringern.

Refine Search

Showing 25,301 through 25,325 of 54,466 results