图书介绍
计算机系统研究基础 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- 施巍松主编 著
- 出版社: 北京:高等教育出版社
- ISBN:9787040290639
- 出版时间:2010
- 标注页数:268页
- 文件大小:22MB
- 文件页数:283页
- 主题词:计算机系统-英文
PDF下载
下载说明
计算机系统研究基础 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Part Ⅰ General3
1 Elements3
1.1 Top Systems Conferences/Journals3
1.2 How to Read a Research Paper5
1.3 How to Write a Research Paper6
1.3.1 Abstract6
1.3.2 Introduction6
1.3.3 Background Information/Problem Statement6
1.3.4 Your Approach6
1.3.5 Implementation6
1.3.6 Performance Evaluation7
1.3.7 Related Work7
1.3.8 Conclusions7
1.3.9 Acknowledgement7
1.3.10 References8
1.3.11 Most Common Mistakes in Paper Writing8
1.4 How to Give a Presentation9
1.4.1 General Approach9
1.4.2 Understanding the Paper10
1.4.3 Adapting the Paper for Presentation10
1.4.4 Slides11
1.4.5 The Dry-Run12
1.4.6 To Memorize or not to Memorize?13
1.4.7 You Are on the Stage13
1.4.8 Interacting with the Audience and Dealing with Questions14
1.5 Final Words:On Being a Scientist14
References15
2 Rules of Thumb16
2.1 Rules of Thumb16
2.2 Further Readings17
References17
Part Ⅱ Design21
3 Bloom Filters21
3.1 Introduction21
3.2 Standard Bloom Filters22
3.2.1 Basic Idea of Bloom Filters22
3.2.2 False Positive Rate Estimation23
3.2.3 Optimal Number of Hash Functions23
3.2.4 Another Method of Implementing24
3.3 Counting Bloom Filters25
3.4 Compressed Bloom Filters27
3.5 D-left Counting Bloom Filters28
3.5.1 D-left Hashing28
3.5.2 D-left Counting Bloom Filters29
3.5.3 Performance30
3.6 Spectral Bloom Filters31
3.6.1 Basic Principle of SBF31
3.6.2 SBF Frequency Query Optimization33
3.7 Dynamic Counting Bloom Filters33
3.8 Case Studies34
3.8.1 Case Study 1:Summary Cache35
3.8.2 Case Study 2:IP Traceback36
3.9 Conclusion36
References37
4 Distributed Hash Tables38
4.1 Introduction38
4.2 An Overview of DHT39
4.3 The Overlay Network of DHT40
4.4 Chord:An Implementation of DHT42
4.4.1 Topology of Chord42
4.4.2 Key Lookup in Chord42
4.4.3 Dynamic Updates and Failure Recovery44
4.5 Case Study 1:Cooperative Domain Name System(CoDoNS)46
4.5.1 Background and Motivation46
4.5.2 Overview of the System47
4.5.3 DHT in CoDoNS47
4.5.4 Evaluation48
4.6 Case Study 2:Cooperative File System(CFS)48
4.6.1 Background and Motivation48
4.6.2 Overview of the System49
4.6.3 DHT in CFS49
4.6.4 Evaluation49
References50
5 Locality Sensitive Hashing52
5.1 Introduction52
5.1.1 Basic Idea of LSH52
5.1.2 The Origin of LSH53
5.2 Overview53
5.2.1 The Definition53
5.2.2 Properties of LSH54
5.2.3 Several LSH Families54
5.2.4 Approximate Nearest Neighbor58
5.3 Case Study 1:Large-Scale Sequence Comparison60
5.3.1 Theory60
5.3.2 Algorithm Complexity61
5.3.3 Implementation Details61
5.3.4 Results62
5.4 Case Study 2:Image Retrieval62
5.4.1 Motivation62
5.4.2 The Problems of Existing Approaches62
5.4.3 The System63
5.4.4 Results63
References63
6 XOR Operations65
6.1 Introduction65
6.2 XOR Operation65
6.2.1 Truth Table66
6.2.2 Set Diagrams66
6.3 XOR Properties66
6.4 Compress with XOR67
6.4.1 Case Study 1:XOR-linked list67
6.4.2 Case Study 2:XOR swap algorithm68
6.5 Fault Tolerance68
6.5.1 Case Study 3:Hamming(7,4)code68
6.5.2 Hamming Codes with Additional Parity70
6.5.3 Case Study 4:RAID70
6.6 Case Study 5:Feistel Cipher71
6.7 Case Study 6:Kademlia72
6.7.1 XOR Metric in Kademlia73
6.7.2 Routing Table in Kademlia74
6.7.3 Kademlia Protocol74
6.8 Conclusion75
References76
7 Adaptation77
7.1 Introduction77
7.2 How Adaptation Works and Key Issues78
7.2.1 How Does Adaptation Work?78
7.2.2 Classification of Adaptation80
7.3 Case Studies83
7.3.1 Case Study 1:Adaption in Internet Routing System83
7.3.2 Case Study 2:Adaptive Self-Configuration for Sensor Networks87
References90
8 Optimistic Replication92
8.1 Introduction92
8.2 Topic Description94
8.2.1 Design Considerations94
8.2.2 Techniques and Algorithms95
8.3 Case Studies100
8.3.1 Case Study 1:The Notes System100
8.3.2 Case Study 2:The Bayou system102
References106
9 Reputation and Trust107
9.1 Introduction107
9.2 Reputation Systems:Challenges and Models108
9.2.1 Challenges108
9.2.2 Reputation Models109
9.2.3 Threat Model113
9.3 Comparison of Representative Work114
9.4 Case Studies116
9.4.1 Case Study 1:EigenTrust117
9.4.2 Case Study 2:HOURS117
9.5 Conclusion118
References118
10 Moving Average120
10.1 Introduction120
10.2 Topic Description120
10.2.1 Simple Moving Average121
10.2.2 Cumulative Moving Average121
10.2.3 Weighted Moving Average121
10.2.4 Exponential Weighted Moving Average122
10.3 Case Study 1:Attacks Detection123
10.3.1 Introduction of Denial of Service Attack123
10.3.2 Anomalies Detection124
10.3.3 SYN Flooding Detection126
10.3.4 Other Methods126
10.4 Case Study 2:Machine Monitoring Technique127
10.5 Case Study 3:Data Cleaning in Wireless Sensor Networks130
10.6 Conclusion132
References132
11 Machine Learning134
11.1 Machine Learning Concepts134
11.1.1 Concepts and History135
11.2 Introduction of Machine Learning136
11.2.1 A Typical Machine Learning Problem136
11.2.2 Machine Learning in Computer Systems Research139
11.3 Machine Learning Techniques140
11.3.1 Category140
11.3.2 Machine Learning Techniques and Algorithms142
11.4 Case Studies145
11.4.1 Case Study 1:Large-Scale System Problem Detection145
11.4.2 Case Study 2:Snitch146
11.5 Conclusion147
References148
Part Ⅲ Implementation153
12 Asynchronous I/O153
12.1 Motivation153
12.2 I/O Multiplexing155
12.3 Asynchronous I/O158
12.3.1 Linux Asynchronous I/O158
12.3.2 Windows Overlapped I/O164
12.4 Conclusion172
References172
13 Multithreading173
13.1 Background173
13.2 The Concept of Thread174
13.3 Hardware Support for Multithreading175
13.3.1 Block Multithreading175
13.3.2 Interleaved Multithreading176
13.3.3 Simultaneous Multithreading176
13.4 Multithreading Programming176
13.4.1 POSIX Threads(Pthreads)177
13.4.2 JAVA Threads178
13.4.3 WIN32 Threads178
13.4.4 Common APIs180
13.5 Multithreading Synchronization184
13.5.1 Multithreading Synchronization Problems184
13.5.2 Mutual Exclusion185
13.5.3 Solutions of Mutual Exclusion186
13.5.4 Mutual Exclusion Cases187
13.6 Case Studies188
13.7 Conclusion199
References189
14 Virtualization191
14.1 Virtualization Definitions191
14.2 A Brief History of Virtualization192
14.2.1 The Mainframe Virtualization193
14.2.2 The x86 Virtualization193
14.3 Why Virtualization?194
14.4 Virtualization Capabilities196
14.5 The Benefits of Virtualization196
14.5.1 Increasing Utilization196
14.5.2 Reducing Cost197
14.5.3 Isolation197
14.5.4 Improving Application Development Process197
14.5.5 Business Continuity198
14.5.6 Manageability,Scalability and Flexibility198
14.6 Types of Virtualization199
14.7 Virtualization Vendors and Products201
14.8 Case Studies201
14.8.1 Case Study 1:JVM202
14.8.2 Case Study 2:VirtualPower204
14.9 Issues of Virtualization205
14.9.1 Issues of Adopting Virtualization205
14.9.2 Issues of Providing Virtualization206
References208
Part Ⅳ Evaluation213
15 Queueing Theory213
15.1.1 Queueing Models214
15.2 Fundamental Concepts216
15.2.1 Useful Probability Distributions216
15.2.2 Markov Chain218
15.3 Queueing Systems219
15.3.1 Markovian Queues220
15.3.2 Non-Markovian Queues224
15.4 Queueing Networks226
15.5 Case Studies227
15.5.1 Case Study 1:Telephone Systems227
15.5.2 Case Study 2:A Barber Shop227
References229
16 Black Box Testing230
16.1 Introduction230
16.2 Black Box Testing Techniques231
16.2.1 Equivalence Partitioning231
16.2.2 Boundary Value Analysis232
16.2.3 Decision Table Testing232
16.2.4 Pairwise Testing233
16.2.5 State Transition Tables233
16.2.6 Use Case Testing234
16.3 Other Methods of Software Testing234
16.4 Case Studies235
16.4.1 Case Study 1:Web Services235
16.4.2 Case Study 2:MobileTest239
References242
17 Goodness-of-Fit244
17.1 Introduction244
17.2 General Topics in Goodness-of-Fit245
17.2.1 Hypothesis Testing246
17.2.2 Definition247
17.2.3 Common Problems in Goodness-of-Fit Tests247
17.2.4 Quantitative Goodness-of-fit Techniques249
17.3 Chi-Square Test249
17.3.1 Meaning of the Chi-Square Test250
17.3.2 Definition of Chi-Square251
17.4 Kolmogorov-Smirnov test254
17.4.1 How Does K-S Test Work?255
17.4.2 Comparison of Chi-Square and Kolmogorov-Smirnov Tests261
17.5 Case Studies262
17.5.1 Case Study 1:Object Characteristics of Dynamic Web Content262
17.5.2 Case Study 2:Failures in High-Performance Computing Systems263
References263
Index265
热门推荐
- 2147659.html
- 1710243.html
- 1673380.html
- 3001328.html
- 316130.html
- 2685040.html
- 1356903.html
- 3088837.html
- 1542629.html
- 249213.html
- http://www.ickdjs.cc/book_1735867.html
- http://www.ickdjs.cc/book_2827462.html
- http://www.ickdjs.cc/book_2095268.html
- http://www.ickdjs.cc/book_2981638.html
- http://www.ickdjs.cc/book_187462.html
- http://www.ickdjs.cc/book_2747961.html
- http://www.ickdjs.cc/book_123803.html
- http://www.ickdjs.cc/book_926859.html
- http://www.ickdjs.cc/book_1677823.html
- http://www.ickdjs.cc/book_1234026.html