bullet  Advances in Computers and Software Engineering: Reviews, Vol.1

    (Open Access Book)


  Title: Advances in Computers and Software Engineering: Reviews

  Editor: Sergey Y. Yurish

  Publisher: International Frequency Sensor Association (IFSA) Publishing, S. L.

  Formats: hardcover (print book) and printable pdf Acrobat (e-book), 204 pages

  Price: 85.00 EUR for print book in hardcover

  Delivery time for print book: 7-17 days. Please contact us for priority (5-9 days), ground (3-8 days) and express (2-3 days) delivery options by e-mail

  Pubdate: 5 October 2018

  ISBN: 978-84-09-05559-3

  e-ISBN: 978-84-09-05558-6


  Creative Commons License




Open Access book in pdf format

(free download, 7.50 MB):






Buy print book:


 Book Description


 Advances in Computers and Software Engineering: Reviews, Vol.1. The first volume of ‘Advances in Computers and Software Engineering: Reviews’, Book Series contains 6 chapters written by 21 authors from 7 countries: Brazil, Canada, Palestine, Slovakia, Spain, Taiwan and USA, and covers some topics on computers, software and DAQ sytems.







1. A Methodology for Performance Optimization of Data Parallel Applications on Heterogeneous Computing Platforms

1.1. Introduction
1.2. On the Optimization of the Computation
1.3. Modeling Communications with -Lop
1.3.1. An Introduction to -Lop
1.3.2. Assessing the Optimization of Collectives
1.3.3. Building the Model Parameters
1.4. Optimizing the Communications of Hybrid Kernels
1.5. Conclusions


2. An XPath Query Aggregation Approach for XML Publish/Subscribe Systems

2.1. Introduction
2.2. Related Work
2.2.1. Main Functional Components for XML Pub/Sub Systems
2.2.2. XML Query Containment and Homomorphism
2.2.3. Node Labeling or Indexing Schemes for XML Database Queries
2.2.4. XSearch and TwigStack
2.3. Our XPath Query Aggregation Approach Using Region Encoding Scheme
2.3.1. Global Query Tree, Region Node Coding and the Data Structures
2.3.2. Containee Algorithm of the New Approach
2.3.3. Container Algorithm of the New Approach
2.3.4. Complexity Analysis
2.3.5. Label Maintenance for Dynamic Query Updates
2.4. Experimental Evaluation
2.4.1. Experiments with NITF Queries Processing Time Versus the Number of NITF Queries Processing Time Versus the Number of Branches in NITF Queries
2.4.2. Processing Time for Large Number of Queries
2.4.3. Parsing Time for XPath Queries and Building Time for the Global Query Tree
2.4.4. Building Time for Region Codes and Label Lists
2.4.5. Space Usage for NITF Experiments
2.5. Conclusions


3. A Small World Load-Balancing Approach for Queues Based Systems

3.1. Introduction
3.2. Literature Review	
3.2.1. Background on Small World Networks
3.2.2. Related Works
3.3. Functional Small World Network 
3.3.1. Overview
3.3.2. Constructing Functional Small World (FSW) Overlay Network Functional-Clustering (FC) Cluster-Formation Overlay Network Construction
3.4. Dynamic Load-Balancing
3.4.1. Problem Formulation
3.4.2. Our Proposed Algorithm The Initialization Stage The Information Broadcasting Stage Computing the Average Effective-Load Finding the Set of Assistant-Neighbors Stage Workload Transfer Strategy Load-Balancing Mechanism (Procedure LB)
3.5. Experiments
3.5.1. Experimental Setting
3.5.2. Comparative Study Average Response Time Throughput Communication Overhead Movement Cost Makespan Queue Length
3.5.3. Results and Discussion
3.6. Conclusion

4. Error Model Identification of Data Acquisition Systems by Nonstandardized Test Signals

4.1. Introduction
4.2. Selected DAQ Error Parameters and Their Testing	
4.2.1. Basic DAQ Parameters
4.2.2. Standardized DAQ Testing Methods
4.3. Testing of DAQ Based on the Error Model Identification
4.3.1. Error Models
4.3.2. Architecture Depended Models
4.3.3. Behavioral Error Models Unified Error Model Error Model Identification Using Nonstandardized Signals
4.4. Experimental Results
4.5. Conclusions

5. Affinity Aware Scheduler of Cluster Virtual Nodes on Clouds

5.1. Introduction
5.1.1. Motivation
5.1.2. Methodology
5.2. Problem Specification
5.2.1. Problem Analysis
5.2.2. Hypothesis
5.3. Affinity Performance Evaluation
5.3.1. Experimental Affinity Results
5.4. Allocation Model
5.5. Evaluated Job Scheduling Strategies
5.6. Simulation of Scheduling Solution
5.6.1. Simulation with Concurrent Jobs Based on Affinity  of Experiments
5.6.2. AffinityAwareFifoScheduler Model
5.7. ProSched: The Affinity Aware Scheduler
5.7.1. Scheduler Method
5.7.2. Scheduler Results
5.8. Related Work
5.9. Conclusion
5.9.1. Future Work


6. DDoS Attack Protection in the Era  of Cloud Computing and Software-Defined Networking

6.1. Introduction
6.2. Analysis
6.2.1. Cloud Computing
6.2.2. Impact of Cloud Computing on DDoS Attack Defense
6.2.3. Software-Defined Networking
6.2.4. Impact of SDN on DDoS Attack Defense
6.2.5. DDoS Attack Defense in Cloud Computing and SDN
6.3. DaMask Design
6.3.1. Design Overview
6.3.2. Workflow of DaMask DaMask-D Module DaMask-M Module
6.4. Graphical Model Based Detection System
6.4.1. Graphical Inference Model Automatic Feature Selection Attack Detection
6.4.2. Graph Model Update
6.5. DaMask Evaluation
6.5.1. Evaluation Setting Private Cloud Public Cloud Evaluation Dataset
6.5.2. DaMask Overhead Computation Cost of Attack Detection Communication Overhead
6.5.3. Adapting Topology Change
6.5.4. Detection Performance Data Shift Accuracy Comparison
6.6. Related Work
6.7. Conclusion





We accept also a bank account money transfers and checks. Please contact by
e-mail for details.


Buy this print book:



See other books published by IFSA Publishing






1999 - 2019 Copyright ©, International Frequency Sensor Association (IFSA) Publishing, S. L. All Rights Reserved.


Home - Bookstore - Sensors & Transducers journal - IFSA Privacy Policy