Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)
GPU Computing Gems Emerald Edition (Applications of GPU Computing Series)

We are entering the golden age of GPU computing. Since the introduction of CUDA in 2007, more than 100 million computers with CUDA-capable GPUs have been shipped to end users. Unlike the previous GPGPU shader programming models, CUDA supports parallel programming in C. From my own experience in teaching CUDA programming, C programmers...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

OpenCL in Action: How to Accelerate Graphics and Computations
OpenCL in Action: How to Accelerate Graphics and Computations
In the summer of 1997, I was terrified. Instead of working as an intern in my major (microelectronic engineering), the best job I could find was at a research laboratory devoted to high-speed signal processing. My job was to program the two-dimensional fast Fourier transform (FFT) using C and the Message Passing Interface...
Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003
Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003

Get real-world guidance—direct from the Microsoft Windows Server 2003 team—for planning and deploying an upgrade from Windows NT 4.o to Windows Server 2003 for your small or medium-sized business. This book delivers straightforward, step-by-step instructions on how to upgrade to an Active Directory directory service environment;...

Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an...

Linux Performance Tuning and Capacity Planning (Kaleidoscope)
Linux Performance Tuning and Capacity Planning (Kaleidoscope)

Covering topics from analysis tools to kernel tuning, to capacity management, this book offers a single point of reference for what you need to know. Anyone who has ever had to speed existing operations or project usage patterns for future loads, knows that tracking down the relevant information can be a difficult task. That's why this book has...

Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)
Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)

The main goal of this graduate-level text is to provide a language for understanding, unifying, and implementing a wide variety of algorithms for digital signal processing -- in particular, to provide rules and procedures that can simplify or even automate the task of writing code for the newest parallel and vector machines. It thus bridges...

Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms
Moving Media Storage Technologies: Applications & Workflows for Video and Media Server Platforms

Storage technologies have fundamentally changed the landscape of digital media in a profound way. Gone are the days of using a single hard disk drive on a workstation as the sole means to store digital content. Nearly vanished is the practice of capturing video and audio only on videotape. The practice of transferring videotape...

Human Machine Interaction: Research Results of the MMI Program
Human Machine Interaction: Research Results of the MMI Program

Human Machine Interaction, or more commonly Human Computer Interaction, is the study of interaction between people and computers. It is an interdisciplinary field, connecting computer science with many other disciplines such as psychology, sociology and the arts.

The present volume documents the results of the MMI research program...

Informatics for the Clinical Laboratory: A Practical Guide for the Pathologist (Health Informatics)
Informatics for the Clinical Laboratory: A Practical Guide for the Pathologist (Health Informatics)

This series is directed to healthcare professionals who are leading the tra- formation of health care by using information and knowledge. Launched in 1988 as Computers in Health Care, the series offers a broad range of titles: some addressed to specific professions such as nursing, medicine, and health administration; others to special areas...

Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems
Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems
A new approach to the study of arithmetic circuits

In Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems, the authors take a novel approach of presenting methods and examples for the synthesis of arithmetic circuits that better reflects the needs of today's computer system designers and engineers....

Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3
...
unlimited object storage image
Result Page: 151 150 149 148 147 146 145 144 143 142 141 140 139 138 137 136 135 134 133 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy