注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)計(jì)算機(jī)科學(xué)理論與基礎(chǔ)知識(shí)計(jì)算機(jī)系統(tǒng)研究基礎(chǔ)(國(guó)內(nèi)英文版)

計(jì)算機(jī)系統(tǒng)研究基礎(chǔ)(國(guó)內(nèi)英文版)

計(jì)算機(jī)系統(tǒng)研究基礎(chǔ)(國(guó)內(nèi)英文版)

定 價(jià):¥59.00

作 者: 施巍松 主編
出版社: 高等教育出版社
叢編項(xiàng):
標(biāo) 簽: 計(jì)算機(jī)理論

購(gòu)買這本書(shū)可以去


ISBN: 9787040290639 出版時(shí)間: 2010-10-01 包裝: 平裝
開(kāi)本: 16開(kāi) 頁(yè)數(shù): 267 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  自從計(jì)算機(jī)問(wèn)世以來(lái),計(jì)算機(jī)系統(tǒng)結(jié)構(gòu)的研究重點(diǎn)發(fā)生了很多變化,這讓一些希望從事這方面研究的新手覺(jué)得很難入門。作者根據(jù)多年從事研究和指導(dǎo)研究生的經(jīng)驗(yàn),把計(jì)算機(jī)系統(tǒng)研究中最常用的原理和關(guān)鍵技術(shù)匯集在一起。在基本知識(shí)部分,作者描述了從事系統(tǒng)結(jié)構(gòu)研究的基本要領(lǐng),包括如何讀、寫(xiě)、說(shuō),以及英文寫(xiě)作最常見(jiàn)的問(wèn)題,并給出了12個(gè)最經(jīng)典的設(shè)計(jì)原理和經(jīng)驗(yàn)。在關(guān)鍵技術(shù)部分,作者從建模、設(shè)計(jì)、實(shí)現(xiàn)和性能評(píng)測(cè)方面選擇了15個(gè)關(guān)鍵技術(shù)進(jìn)行了詳細(xì)的討論和描述,每一個(gè)關(guān)鍵技術(shù)的題目都經(jīng)過(guò)精心挑選,并且提供多個(gè)實(shí)例分析。《計(jì)算機(jī)系統(tǒng)研究基礎(chǔ)(英文版)》可供計(jì)算機(jī)系統(tǒng)結(jié)構(gòu)初學(xué)者使用,也可供高年級(jí)本科生和研究生在學(xué)習(xí)有關(guān)課程時(shí)參考。

作者簡(jiǎn)介

  施巍松,美國(guó)韋恩州立大學(xué)計(jì)算機(jī)科學(xué)系副教授,移動(dòng)和因特網(wǎng)系統(tǒng)結(jié)構(gòu)實(shí)驗(yàn)室主任,可持續(xù)計(jì)算實(shí)驗(yàn)室主任。美國(guó)國(guó)家科學(xué)基金會(huì)杰出青年教授獎(jiǎng)獲得者,全國(guó)百篇優(yōu)秀博士論文獲得者。IEEE資深會(huì)員,IEEE Internet Computing及Joumal of Parallel and Distriibuted Computinq客座編輯,Journal of Computer Scierice and Techology及International Journal of Sensor Networks編委。施巍松博士的研究興趣包括計(jì)算機(jī)系統(tǒng)和可持續(xù)計(jì)算等。

圖書(shū)目錄

Part I General
Elements
1.1 Top Systems Conferences/Journals
1.2 How to Read a Research Paper
1.3 How to Write a Research Paper
1.3.1 Abstract
1.3.2 Introduction
1.3.3 Background Information/Problem Statement
1.3.4 Your Approach
1.3.5 Implementation
1.3.6 Performance Evaluation
1.3.7 Related Work
1.3.8 Conclusions
1.3.9 Acknowledgement
1.3.10 References
1.3.11 Most Common Mistakes in Paper Writing
1.4 How to Give a Presentation
1.4.1 General Approach
1.4.2 Understanding the Paper
1.4.3 Adapting the Paper for Presentation
1.4.4 Slides
1.4.5 The Dry-Run
1.4.6 To Memorize or not to Memorize?
1.4.7 You Are on the Stage
1.4.8 Interacting with the Audience and Dealing with Questions
1.5 Final Words: On Being a Scientist
References
2 Rules of Thumb
2.1 Rules of Thumb
2.2 Further Readings
References
Part Ⅱ Design
3 Bloom Filters
3.1 Introduction
3.2 Standard Bloom Filters
3.2.1 Basic Idea of Bloom Filters
3.2.2 False Positive Rate Estimation
3.2.3 Optimal Number of Hash Functions
3.2.4 Another Method of Implementing
3.3 Counting Bloom Filters
3.4 Compressed Bloom Filters
3.5 D-left Counting Bloom Filters
3.5.1 D-left Hashing
3.5.2 D-left Counting Bloom Filters
3.5.3 Performance
3.6 Spectral Bloom Filters
3.6.1 Basic Principle of SBF
3.6.2 SBF Frequency Query Optimization
3.7 Dynamic Counting Bloom Filters
3.8 Case Studies
3.8.1 Case Study 1: Summary Cache
3.8.2 Case Study 2: IP Traceback
3.9 Conclusion.
References
4 Distributed Hash Tables
4.1 Introduction
4.2 An Overview of DHT
4.3 The Overlay Network of DHT
4.4 Chord: An Implementation of DHT.
4.4.1 Topology of Chord
4.4.2 Key Lookup in Chord
4.4.3 Dynamic Updates and Failure Recovery
4.5 Case Study 1: Cooperative Domain Name System (CoDoNS)
4.5.1 Background and Motivation
4.5.2 Overview of the System
4.5.3 DHT in CoDoNS
4.5.4 Evaluation
4.6 Case Study 2: Cooperative File System (CFS)
4.6.1 Background and Motivation.
4.6.2 Overview of the System
4.6.3 DHT in CFS
4.6.4 Evaluation
References
5 Locality Sensitive Hashing
5.1 Introduction
5.1.1 Basic Idea of LSH
5.1.2 The Origin of LSH
5.2 Overview.
5.2.1 The Definition
5.2.2 Properties of LSH
5.2.3 Several LSH Families
5.2.4 Approximate Nearest Neighbor
5.3 Case Study 1: Large-Scale Sequence Comparison
5.3.1 Theory
5.3.2 Algorithm Complexity
5.3.3 Implementation Details
5.3.4 Results
5.4 Case Study 2: Image Retrieval
5.4.1 Motivation
5.4.2 The Problems of Existing Approaches
5.4.3 The System
5.4.4 Results
References
6 XOR Operations
6.1 Introduction
6.2 XOR Operation
6.2.1 Truth Table
6.2.2 Set Diagrams
6.3 XOR Properties
6.4 Compress with XOR
6.4.1 Case Study 1: XOR-linked list
6.4.2 Case Study 2: XOR swap algorithm.
6.5 Fault Tolerance
6.5.1 Case Study 3: Hamming (7,4) code
6.5.2 Hamming Codes with Additional Parity
6.5.3 Case Study 4: RAID
6.6 Case Study 5: Feistel Cipher
6.7 Case Study 6: Kademlia
6.7.1 XOR Metric in Kademlia
6.7.2 Routing Table in Kademlia
6.7.3 Kademlia Protocol
6.8 Conclusion.
References
7 Adaptation
8 Optimistic Replication.
9 Reputation and Trust
10 Moving Average
Part Ⅲ Implementation
Part Ⅳ Evalution

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)