In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a c
A ground-breaking attempt at articulating a philosophy of computer science, this book is an introduction to the philosophical foundations of computer science and the contributions that philosophy and
This edition is thoroughly updated and expanded to address broadband network management and the latest trends in the network management technology and standards. The author¿s unique approach thoroughl
As miniaturisation deepens, and nanotechnology and its machines become more prevalent in the real world, the need to consider using quantum mechanical concepts to perform various tasks in computation
ASN.1 Complete teaches you everything you need to know about ASN.1-whether you're specifying a new protocol or implementing an existing one in a software or hardware development project. Inside, the
Most people are baffled by how computers work and assume that they will never understand them. What they don’t realize—and what Daniel Hillis’s short book brilliantly demonstrates—is that computers’ s
Predicts that quantum computation will bypass conventional computers, and explains quantum entanglement, how quantum computers might work, and the possibility of teleportation
Foundations of Multithreaded, Parallel, and Distributed Programming covers, and then applies, the core concepts and techniques needed for an introductory course in this subject. Its emphasis is on the
A text on networking theory and practice, providing information on general networking concepts, routing algorithms and protocols, addressing, and mechanics of bridges, routers, switches, and hubs. Des
Philosophy and Computing explores each of the following areas of technology: the digital revolution; the computer; the Internet and the Web; CD-ROMs and Mulitmedia; databases, textbases, and hypertext
Speedy, reliable, and secure communications are essential for maintaining an organizationis competitiveness, and Wide Area Networks and Internetworks are quickly proliferating in order to meet this ne
Honorable Mention, Business, Management & Accounting category, 1998 Professional/Scholarly Publishing Annual Awards Competition presented by the Association of American Publishers, Inc.Technologies h
A detailed guide to the Peripheral Component Interconnect (PCI) Bus Specification, Intel's technology for communication between peripheral devices and the computer processor. Explains the relationship
"I sincerely wish (this book) had been available when I had to learn all this stuff the hard way."--Steve Vinoski "An excellent job of introducing and defining the jargon associated with embedded s
Janet Abbate recounts the key players and technologies that allowed the Internet todevelop; but her main focus is always on the social and cultural factors that influenced theInternet's design and use
The pi-calculus differs from other models of communicating behaviour mainly in its treatment of mobility. The movement of a piece of data inside a computer program is treated exactly the same as the transfer of a message - or indeed an entire computer program - across the internet. One can also describe networks which reconfigure themselves. The calculus is very simple but powerful; its most prominent ingredient is the notion of a name. Its theory has two important ingredients: the concept of behavioural (or observational) equivalence, and the use of a new theory of types to classify patterns of interactive behaviour. The internet, and its communication protocols, fall within the scope of the theory just as much as computer programs, data structures, algorithms and programming languages. This book is the first textbook on the subject; it has been long-awaited by professionals and will be welcomed by them, and their students.
Supercomputing research--the goal of which is to make computers that are ever fasterand more powerful--has been at the cutting edge of computer technology since the early 1960s. Untilrecently, researc
Each section of the book is designed to cover a separate "layer" of a critical networking issue, such as bridging, routed protocols, and more. The book provides complete coverage of Cisco-specific tro