Browse Results

Showing 26,726 through 26,750 of 32,908 results

ReSharper Essentials

by Łukasz Gąsior

A practical, hands-on guide that will help you to unleash the power of ReSharper to write better quality code. If you are a developer who is working with Visual Studio and are looking to make your work more efficient, this book is for you. It is most useful for new ReSharper users but those who are currently using it will also find many useful tips and references updated to the latest version (8.1). Prior knowledge of Visual Studio is a must.

RESI Basic Skills & Knowledge Lab Guide

by Stuart Palmer Whitney Freeman Gregory Ter-Oganov Joseph A. Coney

The RESI Basic Lab Guide provides an excellent hands-on component to emphasize the theoretical materials provided in the RESI Basic Concepts and Practices Training Guide. Applying chapter concepts developed in the textbook to these lab exercises is crucial in preparing for a successful career as a computer technician.

Resident Evil: Extinction

by Keith R. Decandido

Following the events of Resident Evil: Apocalypse, the beautiful, dangerous, enigmatic Alice returns, and this time she and her fellow survivor Carlos Olivera are running with a pack of humans led by a new ally, Claire Redfield. Together they are cutting through the wastelands of the United States on a long trek to Alaska. Hunted by the minions of the scheming Dr. Isaacs, Alice has zombies hungry for her flesh and the Umbrella Corporation's monstrous lab rats hungry for her blood...while Alice herself hungers only for revenge.

Resident Evil: Extinction

by Keith R. A. Decandido

Following the events of Resident Evil: Apocalypse, the beautiful, dangerous, enigmatic Alice returns, and this time she and her fellow survivor Carlos Olivera are running with a pack of humans led by a new ally, Claire Redfield. Together they are cutting through the wastelands of the United States on a long trek to Alaska. Hunted by the minions of the scheming Dr. Isaacs, Alice has zombies hungry for her flesh and the Umbrella Corporation's monstrous lab rats hungry for her blood...while Alice herself hungers only for revenge.

Residue Number Systems

by P. V. Ananda Mohan

This new and expanded monograph improves upon Mohan's earlier book, Residue Number Systems (Springer, 2002) with a state of the art treatment of the subject. Replete with detailed illustrations and helpful examples, this book covers a host of cutting edge topics such as the core function, the quotient function, new Chinese Remainder theorems, and large integer operations. It also features many significant applications to practical communication systems and cryptography such as FIR filters and elliptic curve cryptography. Starting with a comprehensive introduction to the basics and leading up to current research trends that are not yet widely distributed in other publications, this book will be of interest to both researchers and students alike.

Resilience and Risk

by Igor Linkov José Manuel Palma-Oliveira

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry, government and academia in the new and emerging field of resilience in order to provide a more comprehensive and universal understanding of how resilience methodology can be applied in various disciplines and applications. This book advocates for a systems-driven view of resilience in applications ranging from cyber security to ecology to social action, and addresses resilience-based management in infrastructure, cyber, social domains and methodology and tools. Risk and Resilience has been written to open up a transparent dialog on resilience management for scientists and practitioners in all relevant academic disciplines and can be used as supplement in teaching risk assessment and management courses.

Resilience Assessment and Evaluation of Computing Systems

by Katinka Wolter Aad Van Moorsel Alberto Avritzer Marco Vieira

The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of our daily life depend on the correct, reliable and secure operation of often large-scale distributed computing systems. Wolter and her co-editors grouped the 20 chapters from leading researchers into seven parts: an introduction and motivating examples, modeling techniques, model-driven prediction, measurement and metrics, testing techniques, case studies, and conclusions. The core is formed by 12 technical papers, which are framed by motivating real-world examples and case studies, thus illustrating the necessity and the application of the presented methods. While the technical chapters are independent of each other and can be read in any order, the reader will benefit more from the case studies if he or she reads them together with the related techniques. The papers combine topics like modeling, benchmarking, testing, performance evaluation, and dependability, and aim at academic and industrial researchers in these areas as well as graduate students and lecturers in related fields. In this volume, they will find a comprehensive overview of the state of the art in a field of continuously growing practical importance.

Resilience of Cyber-Physical Systems: From Risk Modelling To Threat Counteraction (Advanced Sciences and Technologies for Security Applications)

by Francesco Flammini

This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs’ exposure to new threats, and CPSs’ potential to counteract them. Further, the chapters address topics ranging from risk modeling to threat management and mitigation. The book offers a clearly structured, highly accessible resource for a diverse readership, including graduate students, researchers and industry practitioners who are interested in evaluating and ensuring the resilience of CPSs in both the development and assessment stages. Foreword by Prof. Shiyan Hu, Chair of Cyber-Physical Systems at Linnaeus University, Sweden.

Resilience & Reliability on AWS

by Jurg Van Vliet Flavia Paganelli Jasper Geurtsen

Cloud services are just as susceptible to network outages as any other platform. This concise book shows you how to prepare for potentially devastating interruptions by building your own resilient and reliable applications in the public cloud. Guided by engineers from 9apps-an independent provider of Amazon Web Services and Eucalyptus cloud solutions-you'll learn how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis. This isn't a book on theory. With detailed examples, sample scripts, and solid advice, software engineers with operations experience will learn specific techniques that 9apps routinely uses in its cloud infrastructures. Build cloud applications with the "rip, mix, and burn" approach Get a crash course on Amazon Web Services Learn the top ten tips for surviving outages in the cloud Use elasticsearch to build a dependable NoSQL data store Combine AWS and PostgreSQL to build an RDBMS that scales well Create a highly available document database with MongoDB Replica Set and SimpleDB Augment Redis with AWS to provide backup/restore, failover, and monitoring capabilities Work with CloudFront and Route 53 to safeguard global content delivery

Resilient computer system design

by Igor Schagaev Victor Castano

This book presents a paradigm for designing new generation resilient and evolving computer systems, including their key concepts, elements of supportive theory, methods of analysis and synthesis of ICT with new properties of evolving functioning, as well as implementation schemes and their prototyping. The book explains why new ICT applications require a complete redesign of computer systems to address challenges of extreme reliability, high performance, and power efficiency. The authors present a comprehensive treatment for designing the next generation of computers, especially addressing safety critical, autonomous, real time, military, banking, and wearable health care systems.

Resilient Routing in Communication Networks

by Jacek Rak

This important text addresses the latest issues in end-to-end resilient routing in communication networks. The work highlights the main causes of failures of network nodes and links, and presents an overview of resilient routing mechanisms, covering issues related to the Future Internet (FI), wireless mesh networks (WMNs), and vehicular ad-hoc networks (VANETs). Features: discusses FI architecture for network virtualization; introduces proposals for dedicated and shared protection in random failure scenarios and against malicious activities; describes measures for WMN survivability that allow for evaluation of performance under multiple failures; proposes a new scheme to enable proactive updates of WMN antenna alignment; includes a detailed analysis of the differentiated reliability requirements for VANET applications, with a focus on issues of multihop data delivery; reviews techniques for improving the stability of end-to-end VANET communication paths based on multipath routing and anycast forwarding.

Resilient Wireless Sensor Networks

by Osameh M. Al-Kofahi Ahmed E. Kamal

This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.

Resistance, Liberation Technology and Human Rights in the Digital Age

by Giovanni Ziccardi

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts of hacktivism, the information war between states, a new form of politics (such as open data movements, radical transparency, crowd sourcing and "Twitter Revolutions"), and the hacking of political systems and of state technologies. The book focuses on the protection of human rights in countries with oppressive regimes.

Resonant Scattering and Generation of Waves: Cubically Polarizable Layers (Mathematical Engineering Ser.)

by Lutz Angermann Vasyl V. Yatsyk

This monograph deals with theoretical aspects and numerical simulations of the interaction of electromagnetic fields with nonlinear materials. It focuses in particular on media with nonlinear polarization properties. It addresses the direct problem of nonlinear Electrodynamics, that is to understand the nonlinear behavior in the induced polarization and to analyze or even to control its impact on the propagation of electromagnetic fields in the matter. The book gives a comprehensive presentation of the results obtained by the authors during the last decade and put those findings in a broader, unified context and extends them in several directions.It is divided into eight chapters and three appendices. Chapter 1 starts from the Maxwell’s equations and develops a wave propagation theory in plate-like media with nonlinear polarizability. In chapter 2 a theoretical framework in terms of weak solutions is given in order to prove the existence and uniqueness of a solution of the semilinear boundary-value problem derived in the first chapter. Chapter 3 presents a different approach to the solvability theory of the reduced frequency-domain model. Here the boundary-value problem is reduced to finding solutions of a system of one-dimensional nonlinear Hammerstein integral equations. Chapter 4 describes an approach to the spectral analysis of the linearized system of integral equations. Chapters 5 and 6 are devoted to the numerical approximation of the solutions of the corresponding mathematical models. Chapter 7 contains detailed descriptions, discussions and evaluations of the numerical experiments. Finally, chapter 8 gives a summary of the results and an outlook for future work.

Resource Allocation in Decentralized Systems with Strategic Agents

by Ali Kakhbod

This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (C1). Unicast service provisioning in wired networks. (C2). Multi-rate multicast service provisioning in wired networks. (C3). Power allocation and spectrum sharing in multi-user multi-channel wireless communication systems. Problems in (C1) are market problems; problems in (C2) are a combination of markets and public goods; problems in (C3) are public goods. Dr. Kakhbod developed game forms/mechanisms for unicast and multi-rate multicast service provisioning that possess specific properties. First, the allocations corresponding to all Nash equilibria (NE) of the games induced by the mechanisms are optimal solutions of the corresponding centralized allocation problems, where the objective is the maximization of the sum of the agents' utilities. Second, the strategic agents voluntarily participate in the allocation process. Third, the budget is balanced at the allocations corresponding to all NE of the game induced by the mechanism as well as at all other feasible allocations. For the power allocation and spectrum sharing problem, he developed a game form that possesses the second and third properties as detailed above along with a fourth property: the allocations corresponding to all NE of the game induced by the mechanism are Pareto optimal. The thesis contributes to the state of the art of mechanism design theory. In particular, designing efficient mechanisms for the class of problems that are a combination of markets and public goods, for the first time, have been addressed in this thesis. The exposition, although highly rigorous and technical, is elegant and insightful which makes this thesis work easily accessible to those just entering this field and will also be much appreciated by experts in the field.

Resource-Aware Data Fusion Algorithms for Wireless Sensor Networks

by Magdy Bayoumi Ahmed Abdelgawad

This book introduces resource-aware data fusion algorithms to gather and combine data from multiple sources (e.g., sensors) in order to achieve inferences. These techniques can be used in centralized and distributed systems to overcome sensor failure, technological limitation, and spatial and temporal coverage problems. The algorithms described in this book are evaluated with simulation and experimental results to show they will maintain data integrity and make data useful and informative. Describes techniques to overcome real problems posed by wireless sensor networks deployed in circumstances that might interfere with measurements provided, such as strong variations of pressure, temperature, radiation, and electromagnetic noise; Uses simulation and experimental results to evaluate algorithms presented and includes real test-bed; Includes case study implementing data fusion algorithms on a remote monitoring framework for sand production in oil pipelines.

Resource Management for Big Data Platforms

by Joanna Kołodziej Beniamino Di Martino Florin Pop

Serving as a flagship driver towards advance research in the area of Big Data platforms and applications, this book provides a platform for the dissemination of advanced topics of theory, research efforts and analysis, and implementation oriented on methods, techniques and performance evaluation. In 23 chapters, several important formulations of the architecture design, optimization techniques, advanced analytics methods, biological, medical and social media applications are presented. These chapters discuss the research of members from the ICT COST Action IC1406 High-Performance Modelling and Simulation for Big Data Applications (cHiPSet). This volume is ideal as a reference for students, researchers and industry practitioners working in or interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp the key concerns and their potential solutions.

Resource Management for Device-to-Device Underlay Communication

by Zhu Han Lingyang Song Chen Xu

Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication. This brief presents the state-of-the-art research on resource management for D2D communication underlaying cellular networks. Those who work with D2D communication will use this book's information to help ensure their work is as efficient as possible. Along with the survey of existing work, this book also includes the fundamental theories, key techniques, and applications.

Resource Management for Energy and Spectrum Harvesting Sensor Networks

by Zhigang Chen Xuemin Sherman Shen Haibo Zhou Deyu Zhang

This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a new line of thinking for future sensor networking. Professionals, researchers, and advanced-level students in electrical or computer engineering will find the content valuable.

Resource Management for Internet of Things

by Flávia C. Delicato Paulo F. Pires Thais Batista

This book investigates the pressing issue of resource management for Internet of Things (IoT). The unique IoT ecosystem poses new challenges and calls for unique and bespoke solutions to deal with these challenges. Using a holistic approach, the authors present a thorough study into the allocation of the resources available within IoT systems to accommodate application requirements. This is done by investigating different functionalities and architectural approaches involved in a basic workflow for managing the lifecycle of resources in an IoT system. Resource Management for the Internet of Things will be of interest to researchers and students as well as professional developers interested in studying the IoT paradigm from data acquisition to the delivery of value-added services for the end user.

Resource Management for Multimedia Services in High Data Rate Wireless Networks

by Ruonan Zhang Lin Cai Jianping Pan

This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

Resource Management in Real-Time Systems and Networks

by C. Siva Ram Murthy G. Manimaran

Real-time systems and networks are of increasing importance in many applications, including automated factories, telecommunication systems, defense systems, and space systems. This book introduces the concepts and state-of-the-art research developments of resource management in real-time systems and networks. Unlike other texts in the field, it covers the entire spectrum of issues in resource management, including task scheduling in uniprocessor real-time systems; task scheduling, fault-tolerant task scheduling, and resource reclaiming in multiprocessor real-time systems; conventional task scheduling and object-based task scheduling in distributed real-time systems; message scheduling; QoS routing; dependable communication; multicast communication; and medium access protocols in real-time networks. It provides algorithmic treatments for all of the issues addressed, highlighting the intuition behind each algorithm and giving examples. The book also includes two chapters of case studies.

Resource Management in Utility and Cloud Computing

by Xiaolin Li Han Zhao

This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. It describes three new schemes that address cost-efficiency, user incentives, and allocation fairness with regard to different scheduling contexts. The first scheme, taking the Amazon EC2(tm) market as a case of study, investigates the optimal resource rental planning models based on linear integer programming and stochastic optimization techniques. This model is useful to explore the interaction between the cloud infrastructure provider and the cloud resource customers. The second scheme targets a free-trade resource market, studying the interactions amongst multiple rational resource traders. Leveraging an optimization framework from AI, this scheme examines the spontaneous exchange of resources among multiple resource owners. Finally, the third scheme describes an experimental market-oriented resource sharing platform inspired by eBay's transaction model. The study presented in this book sheds light on economic models and their implication to the utility-oriented scheduling problems.

Resource-Oriented Computing with NetKernel

by Tom Geudens

<p>Take resource-oriented computing out for a spin with this hands-on introduction to NetKernel, and discover how ROC can improve the way you design and implement software and software systems. Learn how ROC&#8217;s new approach combines core ideas from the REST architectural style with the Unix development model. By using NetKernel to create and then string simple services together, you can develop complex systems that scale as easily as the Internet does. Author Tom Geudens helps you create several NetKernel modules right away, and then walks you through the results to demonstrate their effectiveness.</p>

Resource Proportional Software Design for Emerging Systems

by Suparna Bhattacharya Kanchi Gopinath Doug Voigt

Efficiency is a crucial concern across computing systems, from the edge to the cloud. Paradoxically, even as the latencies of bottleneck components such as storage and networks have dropped by up to four orders of magnitude, software path lengths have progressively increased due to overhead from the very frameworks that have revolutionized the pace of information technology. Such overhead can be severe enough to overshadow the benefits from switching to new technologies like persistent memory and low latency interconnects. Resource Proportional Software Design for Emerging Systems introduces resource proportional design (RPD) as a principled approach to software component and system development that counters the overhead of deeply layered code without removing flexibility or ease of development. RPD makes resource consumption proportional to situational utility by adapting to diverse emerging needs and technology systems evolution. Highlights: Analysis of run-time bloat in deep software stacks, an under-explored source of power-performance wastage in IT systems Qualitative and quantitative treatment of key dimensions of resource proportionality Code features: Unify and broaden supported but optional features without losing efficiency Technology and systems evolution: Design software to adapt with changing trade-offs as technology evolves Data processing: Design systems to predict which subsets of data processed by an (analytics or ML) application are likely to be useful System wide trade-offs: Address interacting local and global considerations throughout software stacks and hardware including cross-layer co-design involving code, data and systems dimensions, and non-functional requirements such as security and fault tolerance Written from a systems perspective to explore RPD principles, best practices, models and tools in the context of emerging technologies and applications This book is primarily geared towards practitioners with some advanced topics for researchers. The principles shared in the book are expected to be useful for programmers, engineers and researchers interested in ensuring software and systems are optimized for existing and next generation technologies. The authors are from both industry (Bhattacharya and Voigt) and academic (Gopinath) backgrounds.

Refine Search

Showing 26,726 through 26,750 of 32,908 results