图书介绍

计算机系统研究基础 英文版【2025|PDF下载-Epub版本|mobi电子书|kindle百度云盘下载】

计算机系统研究基础 英文版
  • 施巍松主编 著
  • 出版社: 北京:高等教育出版社
  • ISBN:9787040290639
  • 出版时间:2010
  • 标注页数:268页
  • 文件大小:22MB
  • 文件页数:283页
  • 主题词:计算机系统-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

计算机系统研究基础 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Part Ⅰ General3

1 Elements3

1.1 Top Systems Conferences/Journals3

1.2 How to Read a Research Paper5

1.3 How to Write a Research Paper6

1.3.1 Abstract6

1.3.2 Introduction6

1.3.3 Background Information/Problem Statement6

1.3.4 Your Approach6

1.3.5 Implementation6

1.3.6 Performance Evaluation7

1.3.7 Related Work7

1.3.8 Conclusions7

1.3.9 Acknowledgement7

1.3.10 References8

1.3.11 Most Common Mistakes in Paper Writing8

1.4 How to Give a Presentation9

1.4.1 General Approach9

1.4.2 Understanding the Paper10

1.4.3 Adapting the Paper for Presentation10

1.4.4 Slides11

1.4.5 The Dry-Run12

1.4.6 To Memorize or not to Memorize?13

1.4.7 You Are on the Stage13

1.4.8 Interacting with the Audience and Dealing with Questions14

1.5 Final Words:On Being a Scientist14

References15

2 Rules of Thumb16

2.1 Rules of Thumb16

2.2 Further Readings17

References17

Part Ⅱ Design21

3 Bloom Filters21

3.1 Introduction21

3.2 Standard Bloom Filters22

3.2.1 Basic Idea of Bloom Filters22

3.2.2 False Positive Rate Estimation23

3.2.3 Optimal Number of Hash Functions23

3.2.4 Another Method of Implementing24

3.3 Counting Bloom Filters25

3.4 Compressed Bloom Filters27

3.5 D-left Counting Bloom Filters28

3.5.1 D-left Hashing28

3.5.2 D-left Counting Bloom Filters29

3.5.3 Performance30

3.6 Spectral Bloom Filters31

3.6.1 Basic Principle of SBF31

3.6.2 SBF Frequency Query Optimization33

3.7 Dynamic Counting Bloom Filters33

3.8 Case Studies34

3.8.1 Case Study 1:Summary Cache35

3.8.2 Case Study 2:IP Traceback36

3.9 Conclusion36

References37

4 Distributed Hash Tables38

4.1 Introduction38

4.2 An Overview of DHT39

4.3 The Overlay Network of DHT40

4.4 Chord:An Implementation of DHT42

4.4.1 Topology of Chord42

4.4.2 Key Lookup in Chord42

4.4.3 Dynamic Updates and Failure Recovery44

4.5 Case Study 1:Cooperative Domain Name System(CoDoNS)46

4.5.1 Background and Motivation46

4.5.2 Overview of the System47

4.5.3 DHT in CoDoNS47

4.5.4 Evaluation48

4.6 Case Study 2:Cooperative File System(CFS)48

4.6.1 Background and Motivation48

4.6.2 Overview of the System49

4.6.3 DHT in CFS49

4.6.4 Evaluation49

References50

5 Locality Sensitive Hashing52

5.1 Introduction52

5.1.1 Basic Idea of LSH52

5.1.2 The Origin of LSH53

5.2 Overview53

5.2.1 The Definition53

5.2.2 Properties of LSH54

5.2.3 Several LSH Families54

5.2.4 Approximate Nearest Neighbor58

5.3 Case Study 1:Large-Scale Sequence Comparison60

5.3.1 Theory60

5.3.2 Algorithm Complexity61

5.3.3 Implementation Details61

5.3.4 Results62

5.4 Case Study 2:Image Retrieval62

5.4.1 Motivation62

5.4.2 The Problems of Existing Approaches62

5.4.3 The System63

5.4.4 Results63

References63

6 XOR Operations65

6.1 Introduction65

6.2 XOR Operation65

6.2.1 Truth Table66

6.2.2 Set Diagrams66

6.3 XOR Properties66

6.4 Compress with XOR67

6.4.1 Case Study 1:XOR-linked list67

6.4.2 Case Study 2:XOR swap algorithm68

6.5 Fault Tolerance68

6.5.1 Case Study 3:Hamming(7,4)code68

6.5.2 Hamming Codes with Additional Parity70

6.5.3 Case Study 4:RAID70

6.6 Case Study 5:Feistel Cipher71

6.7 Case Study 6:Kademlia72

6.7.1 XOR Metric in Kademlia73

6.7.2 Routing Table in Kademlia74

6.7.3 Kademlia Protocol74

6.8 Conclusion75

References76

7 Adaptation77

7.1 Introduction77

7.2 How Adaptation Works and Key Issues78

7.2.1 How Does Adaptation Work?78

7.2.2 Classification of Adaptation80

7.3 Case Studies83

7.3.1 Case Study 1:Adaption in Internet Routing System83

7.3.2 Case Study 2:Adaptive Self-Configuration for Sensor Networks87

References90

8 Optimistic Replication92

8.1 Introduction92

8.2 Topic Description94

8.2.1 Design Considerations94

8.2.2 Techniques and Algorithms95

8.3 Case Studies100

8.3.1 Case Study 1:The Notes System100

8.3.2 Case Study 2:The Bayou system102

References106

9 Reputation and Trust107

9.1 Introduction107

9.2 Reputation Systems:Challenges and Models108

9.2.1 Challenges108

9.2.2 Reputation Models109

9.2.3 Threat Model113

9.3 Comparison of Representative Work114

9.4 Case Studies116

9.4.1 Case Study 1:EigenTrust117

9.4.2 Case Study 2:HOURS117

9.5 Conclusion118

References118

10 Moving Average120

10.1 Introduction120

10.2 Topic Description120

10.2.1 Simple Moving Average121

10.2.2 Cumulative Moving Average121

10.2.3 Weighted Moving Average121

10.2.4 Exponential Weighted Moving Average122

10.3 Case Study 1:Attacks Detection123

10.3.1 Introduction of Denial of Service Attack123

10.3.2 Anomalies Detection124

10.3.3 SYN Flooding Detection126

10.3.4 Other Methods126

10.4 Case Study 2:Machine Monitoring Technique127

10.5 Case Study 3:Data Cleaning in Wireless Sensor Networks130

10.6 Conclusion132

References132

11 Machine Learning134

11.1 Machine Learning Concepts134

11.1.1 Concepts and History135

11.2 Introduction of Machine Learning136

11.2.1 A Typical Machine Learning Problem136

11.2.2 Machine Learning in Computer Systems Research139

11.3 Machine Learning Techniques140

11.3.1 Category140

11.3.2 Machine Learning Techniques and Algorithms142

11.4 Case Studies145

11.4.1 Case Study 1:Large-Scale System Problem Detection145

11.4.2 Case Study 2:Snitch146

11.5 Conclusion147

References148

Part Ⅲ Implementation153

12 Asynchronous I/O153

12.1 Motivation153

12.2 I/O Multiplexing155

12.3 Asynchronous I/O158

12.3.1 Linux Asynchronous I/O158

12.3.2 Windows Overlapped I/O164

12.4 Conclusion172

References172

13 Multithreading173

13.1 Background173

13.2 The Concept of Thread174

13.3 Hardware Support for Multithreading175

13.3.1 Block Multithreading175

13.3.2 Interleaved Multithreading176

13.3.3 Simultaneous Multithreading176

13.4 Multithreading Programming176

13.4.1 POSIX Threads(Pthreads)177

13.4.2 JAVA Threads178

13.4.3 WIN32 Threads178

13.4.4 Common APIs180

13.5 Multithreading Synchronization184

13.5.1 Multithreading Synchronization Problems184

13.5.2 Mutual Exclusion185

13.5.3 Solutions of Mutual Exclusion186

13.5.4 Mutual Exclusion Cases187

13.6 Case Studies188

13.7 Conclusion199

References189

14 Virtualization191

14.1 Virtualization Definitions191

14.2 A Brief History of Virtualization192

14.2.1 The Mainframe Virtualization193

14.2.2 The x86 Virtualization193

14.3 Why Virtualization?194

14.4 Virtualization Capabilities196

14.5 The Benefits of Virtualization196

14.5.1 Increasing Utilization196

14.5.2 Reducing Cost197

14.5.3 Isolation197

14.5.4 Improving Application Development Process197

14.5.5 Business Continuity198

14.5.6 Manageability,Scalability and Flexibility198

14.6 Types of Virtualization199

14.7 Virtualization Vendors and Products201

14.8 Case Studies201

14.8.1 Case Study 1:JVM202

14.8.2 Case Study 2:VirtualPower204

14.9 Issues of Virtualization205

14.9.1 Issues of Adopting Virtualization205

14.9.2 Issues of Providing Virtualization206

References208

Part Ⅳ Evaluation213

15 Queueing Theory213

15.1.1 Queueing Models214

15.2 Fundamental Concepts216

15.2.1 Useful Probability Distributions216

15.2.2 Markov Chain218

15.3 Queueing Systems219

15.3.1 Markovian Queues220

15.3.2 Non-Markovian Queues224

15.4 Queueing Networks226

15.5 Case Studies227

15.5.1 Case Study 1:Telephone Systems227

15.5.2 Case Study 2:A Barber Shop227

References229

16 Black Box Testing230

16.1 Introduction230

16.2 Black Box Testing Techniques231

16.2.1 Equivalence Partitioning231

16.2.2 Boundary Value Analysis232

16.2.3 Decision Table Testing232

16.2.4 Pairwise Testing233

16.2.5 State Transition Tables233

16.2.6 Use Case Testing234

16.3 Other Methods of Software Testing234

16.4 Case Studies235

16.4.1 Case Study 1:Web Services235

16.4.2 Case Study 2:MobileTest239

References242

17 Goodness-of-Fit244

17.1 Introduction244

17.2 General Topics in Goodness-of-Fit245

17.2.1 Hypothesis Testing246

17.2.2 Definition247

17.2.3 Common Problems in Goodness-of-Fit Tests247

17.2.4 Quantitative Goodness-of-fit Techniques249

17.3 Chi-Square Test249

17.3.1 Meaning of the Chi-Square Test250

17.3.2 Definition of Chi-Square251

17.4 Kolmogorov-Smirnov test254

17.4.1 How Does K-S Test Work?255

17.4.2 Comparison of Chi-Square and Kolmogorov-Smirnov Tests261

17.5 Case Studies262

17.5.1 Case Study 1:Object Characteristics of Dynamic Web Content262

17.5.2 Case Study 2:Failures in High-Performance Computing Systems263

References263

Index265

热门推荐