Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Data Intensive Computing

Buy
Handbook of Data Intensive Computing, 9781461414148 (1461414148), Springer, 2011
This handbook is carefully edited book – contributors are worldwide experts in the field of data intensive computing and their applications. The scope of the book includes leading edge data intensive computing architectures and systems, innovative storage, virtualization, and parallel processing technologies applied in data intensive computing, and a variety of data intensive applications. Data intensive computing refers to capturing, managing, analyzing, and understanding data at volumes and rates that push the frontiers of current technologies.

The challenge of data intensive computing is to provide the hardware architectures and related software systems and techniques which are capable of transforming ultra-large data into valuable knowledge. Data intensive computing demands a fundamentally different set of principles than mainstream computing. Data-intensive applications typically are well suited for large-scale parallelism over the data and also require extremely high degree of fault-tolerance, reliability, and availability. In addition, most data intensive applications require real-time or near real-time response. The objective of the project is to introduce the basic concepts of data intensive computing, technologies and hardware and software techniques applied in data intensive computing, and current and future applications.

The handbook comprises of four parts, which consist of 30 chapters. The first part on Architectures and Systems includes chapters dealing with network architectures for data intensive computing, data intensive software systems, and high-level programming languages and storage systems for data-intensive computing. The second part on Technologies and Techniques covers load balancing techniques, linking technologies, virtualization techniques, feature ranking methods and other techniques applied in data intensive computing. The third part on Security includes various aspects on privacy and security requirements and related techniques applied in data intensive computing. The fourth part on Applications describes various data intensive applications from earthquake simulations and geosciences to biological systems, social information systems, and bioinformatics.
(HTML tags aren't allowed.)

Clinical Studies Management: A Practical Guide to Success
Clinical Studies Management: A Practical Guide to Success

What if you were suddenly in charge? After the initial excitement of a "battlefield promotion" wears off, you need to get in the trenches and get the job done. And if you are already in the trenches, you need quick access to information that will make your job easier. A comprehensive desk reference and guide, Clinical Studies...

Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software
Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software

In the early days, embedded systems were built primarily by engineers in a pretty exclusive club. Embedded devices and software tools were expensive, and building a functional prototype required significant software engineering and electrical engineering experience.

With the arrival of Arduino, the open source electronics...

.NET 2.0 for Delphi Programmers
.NET 2.0 for Delphi Programmers

.NET 2.0 for Delphi Programmers explores .NET from a Delphi programmer's viewpoint, and it is ideal for Delphi programmers moving to .NET. It presents the core concepts of the .NET world in terms you are familiar with. This book will help you with Delphi for .NET as well as C#.

Apress publishes migration books for both VB 6 and...


The World Atlas of Street Art and Graffiti
The World Atlas of Street Art and Graffiti
An authoritative guide to the most significant artists, schools, and styles of street art and graffiti around the world

Painted murals first appeared in Latin America in the early 20th century; in the 1950s, spray-can graffiti associated with Latino gangs followed, notably the “cholo” graffiti of Los
...
Database System Concepts
Database System Concepts

Database System Concepts, 5/e, is intended for a first course in databases at the junior or senior undergraduate, or first-year graduate, level. In addition to basic material for a first course, the text contains advanced material that can be used for course supplements, or as introductory material for an advanced course.

...

Trends in Optical Non-Destructive Testing and Inspection
Trends in Optical Non-Destructive Testing and Inspection
This book covers a wide range of measurement techniques broadly referred to as Optical Metrology, with emphasis on their applications to nondestructive testing. If we look separately at each of the two terms making the generic name Optical Metrology, we find a link to two of the most distinctive aspects of humans: a particularly well developed...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy