0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (844)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Feedback Strategies for Wireless Communication (Hardcover, 2014 ed.): Berna OEzbek, Didier Le Ruyet Feedback Strategies for Wireless Communication (Hardcover, 2014 ed.)
Berna OEzbek, Didier Le Ruyet
R5,095 Discovery Miles 50 950 Ships in 12 - 19 working days

This book explores the different strategies regarding limited feedback information. The book analyzes the impact of quantization and the delay of CSI on the performance. The author shows the effect of the reduced feedback information and gives an overview about the feedback strategies in the standards. This volume presents theoretical analysis as well as practical algorithms for the required feedback information at the base stations to perform adaptive resource algorithms efficiently and mitigate interference coming from other cells.

High-Performance Networks, Personal Communications and Mobile Computing (Hardcover): Dimitris N Chorafas High-Performance Networks, Personal Communications and Mobile Computing (Hardcover)
Dimitris N Chorafas
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

Many professionals in the technology industry are seeking new solutions beyond the confines of the more traditional type software tools, network design solutions and distributed systems applications. The aim of this book is to provide for them a much needed upgrade of knowledge and skills by addressing the developing technical and business perspectives which have emerged from the deregulation of telecommunications, including issues connected to costs and tariffs. It also addresses a comprehensible introduction to the research, development and implementation of agents. Based on thorough research undertaken from 1993-96 in the United States, Europe and Japan, much practical material is included, with both comprehensive examples and case studies.

Collective Intelligence and E-learning 2.0 - Implications of Web-based Communities and Networking (Hardcover): Harrison Hao... Collective Intelligence and E-learning 2.0 - Implications of Web-based Communities and Networking (Hardcover)
Harrison Hao Yang, Steve Chi-Yin Yuen
R4,977 Discovery Miles 49 770 Ships in 10 - 15 working days

With the advent of Web 2.0, e-learning has the potential to become far more personal, social, and flexible. ""Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking"" provides a valuable reference to the latest advancements in the area of educational technology and e-learning. This innovative collection includes a selection of world-class chapters addressing current research, case studies, best practices, pedagogical approaches, and strategies related to e-learning resources and projects.

Security Engineering for Cloud Computing - Approaches and Tools (Hardcover): David G. Rosado, Daniel Mellado, Eduardo... Security Engineering for Cloud Computing - Approaches and Tools (Hardcover)
David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, Mario Piattini
R5,315 Discovery Miles 53 150 Ships in 10 - 15 working days

Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.

Internet E-Mail - Protocols, Standards, and Implementation (Hardcover): Lawrence Hughes Internet E-Mail - Protocols, Standards, and Implementation (Hardcover)
Lawrence Hughes
R3,528 Discovery Miles 35 280 Ships in 10 - 15 working days

Aims to strengthen the reader's knowledge of the fundamental concepts and technical details necessary to develop, implement, or debug e-mail software. The text explains the underlying technology and describes the key Internet e-mail protocols and extensions such as SMTP, POP3, IMAP, MIME and DSN. It aims to help the reader build a sound understanding of e-mail archtitecture, message flow and tracing protocols, and includes real-world examples of message exchanges with program code that they can refer to when developing or debugging their own systems. The reader should also gain valuable insight into various security topics, including public and secret key encryption, digital signatures and key management. Each chapter begins with a detailed definition list to help speed the reader's understanding of technical terms and acronyms. The CD-ROM contains a listing of related Internet RFCs, as well as RSA PKCS documents, Eudora 3.0 freeware client, and the free user version of Software.com.Post.Office Server for Windows NT 3.0.

Internet Optical Infrastructure - Issues on Monitoring and Failure Restoration (Hardcover, 2015 ed.): Janos Tapolcai, Pin-Han... Internet Optical Infrastructure - Issues on Monitoring and Failure Restoration (Hardcover, 2015 ed.)
Janos Tapolcai, Pin-Han Ho, Peter Babarczi, Lajos Ronyai
R3,260 R2,009 Discovery Miles 20 090 Save R1,251 (38%) Ships in 12 - 19 working days

This book covers the issues of monitoring, failure localization, and restoration in the Internet optical backbone, and focuses on the progress of state-of-the-art in both industry standard and academic research. The authors summarize, categorize, and analyze the developed technology in the context of Internet fault management and failure recovery under the Generalized Multi-Protocol Label Switching (GMPLS), via both aspects of network operations and theories.

The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience... The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) (Hardcover)
Alan Calder
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback): T Lammle Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback)
T Lammle
R1,807 R1,657 Discovery Miles 16 570 Save R150 (8%) Ships in 12 - 19 working days

A two-volume set to help you prepare for success on the NEW Cisco CCNA Certification exam. Get certified and advance your technical career. To earn a Cisco Certified Network Associate (CCNA) certification, you only need to take one exam, which will validate your knowledge and skills related to everything from networking to automation. This inclusive, two-book set provides what you need to know to succeed on the new CCNA exam. The set includes Understanding Cisco Networking Technologies: Volume 1 and the CCNA Certification Study Guide: Volume 2. Understanding Cisco Networking Technologies provides comprehensive information and foundational knowledge about core Cisco technologies, helping you implement and administer Cisco solutions. The CCNA Certification Study Guide prepares you for the new CCNA certification Exam 200-301, which assesses your abilities related to network fundamentals. Both books cover a range of topics so you can get ready for the exam and apply your technical knowledge. Prepare for testing on network and security fundamentals Review network access concepts Solidify your knowledge related to IP connectivity and services Assess your automation and programmability skills Written by a Cisco expert, Todd Lammle, this set helps you master the concepts you need to succeed as a networking administrator. It also connects you to online interactive learning tools, including sample questions, a pre-assessment, practice exam, flashcards, and a glossary. If you want to earn the new CCNA certification and keep moving forward in your IT career, this book and study guide are for you.

Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.): Heike Emmerich, Britta Nestler, Michael... Interface and Transport Dynamics - Computational Modelling (Hardcover, 2003 ed.)
Heike Emmerich, Britta Nestler, Michael Schreckenberg
R4,441 Discovery Miles 44 410 Ships in 10 - 15 working days

An overview of the recent progress of research in computational physics and materials science. Particular topics are modelling of traffic flow and complex multi-scale solidification phenomena. The sections introduce novel research results of experts from a considerable diversity of disciplines such as physics, mathematical and computational modelling, nonlinear dynamics, materials sciences, statistical mechanics and foundry technique. The book intends to create a comprehensive and coherent image of the current research status and illustrates new simulation results of transport and interface dynamics by high resolution graphics. Various possible perspectives are formulated for future activities. Special emphasis is laid on exchanging experiences concerning numerical tools and on the bridging of the scales as is necessary in a variety of scientific and engineering applications. An interesting possibility along this line was the coupling of different computational approaches leading to hybrid simulations.

Views on Evolvability of Embedded Systems (Hardcover, 2011 Ed.): Pierre Van De Laar, Teade Punter Views on Evolvability of Embedded Systems (Hardcover, 2011 Ed.)
Pierre Van De Laar, Teade Punter
R4,534 Discovery Miles 45 340 Ships in 10 - 15 working days

Evolvability, the ability to respond effectively to change, represents a major challenge to today's high-end embedded systems, such as those developed in the medical domain by Philips Healthcare. These systems are typically developed by multi-disciplinary teams, located around the world, and are in constant need of upgrading to provide new advanced features, to deal with obsolescence, and to exploit emerging enabling technologies. Despite the importance of evolvability for these types of systems, the field has received scant attention from the scientific and engineering communities.

Views on Evolvability of Embedded Systems focuses on the topic of evolvability of embedded systems from an applied scientific perspective. In particular, the book describes results from the Darwin project that researched evolvability in the context of Magnetic Resonance Imaging (MRI) systems. This project applied the Industry-as-Laboratory paradigm, in which industry and academia join forces to ensure continuous knowledge and technology transfer during the project's lifetime. The Darwin project was a collaboration between the Embedded Systems Institute, the MRI business unit of Philips Healthcare, Philips Research, and five Dutch universities.

Evolvability was addressed from a system engineering perspective by a number of researchers from different disciplines such as software-, electrical- and mechanical engineering, with a clear focus on economic decision making. The research focused on four areas: data mining, reference architectures, mechanisms and patterns for evolvability, in particular visualization & modelling, and economic decision making. Views on Evolvability of Embedded Systems is targeted at both researchers and practitioners; they will not only find a state-of-the-art overview on evolvability research, but also guidelines to make systems more evolvable and new industrially-validated techniques to improve the evolvability of embedded systems.

High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.): Klaus Schmidt High Availability and Disaster Recovery - Concepts, Design, Implementation (Hardcover, 2006 ed.)
Klaus Schmidt
R2,296 R1,757 Discovery Miles 17 570 Save R539 (23%) Ships in 12 - 19 working days

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business Continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. "High Availability and Disaster Recovery" are contributions of the IT to fulfill this requirement. And companies will be confronted with such demands to an even greater extent in the future, since their credit ratings will be lower without such precautions. Both, "High Availability and Disaster Recovery," are realized by redundant systems. Redundancy can and should be implemented on different abstraction levels: from the hardware, the operating system and middleware components up to the backup computing center in case of a disaster. This book presents requirements, concepts, and realizations of redundant systems on all abstraction levels, and all given examples refer to UNIX and Linux Systems.

Applied Incident Response (Paperback): Sanson Applied Incident Response (Paperback)
Sanson
R965 R886 Discovery Miles 8 860 Save R79 (8%) Ships in 12 - 19 working days

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network, including: Preparing your environment for effective incident response Leveraging MITRE ATT&CK and threat intelligence for active network defense Local and remote triage of systems using PowerShell, WMIC, and open-source tools Acquiring RAM and disk images locally and remotely Analyzing RAM with Volatility and Rekall Deep-dive forensic analysis of system drives using open-source or commercial tools Leveraging Security Onion and Elastic Stack for network security monitoring Techniques for log analysis and aggregating high-value logs Static and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox Detecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more Effective threat hunting techniques Adversary emulation with Atomic Red Team Improving preventive and detective controls

Theoretical Aspects of Distributed Computing in Sensor Networks (Hardcover, Edition.): Sotiris Nikoletseas, Jose D.P. Rolim Theoretical Aspects of Distributed Computing in Sensor Networks (Hardcover, Edition.)
Sotiris Nikoletseas, Jose D.P. Rolim
R3,081 Discovery Miles 30 810 Ships in 10 - 15 working days

Wireless ad hoc sensor networks has recently become a very active research subject. Achieving efficient, fault-tolerant realizations of very large, highly dynamic, complex, unconventional networks is a real challenge for abstract modelling, algorithmic design and analysis, but a solid foundational and theoretical background seems to be lacking. This book presents high-quality contributions by leading experts worldwide on the key algorithmic and complexity-theoretic aspects of wireless sensor networks. The intended audience includes researchers and graduate students working on sensor networks, and the broader areas of wireless networking and distributed computing, as well as practitioners in the relevant application areas. The book can also serve as a text for advanced courses and seminars.

Wimax: Service Standards and Resource Allocation (Hardcover): Timothy Kolaya Wimax: Service Standards and Resource Allocation (Hardcover)
Timothy Kolaya
R3,412 R3,083 Discovery Miles 30 830 Save R329 (10%) Ships in 10 - 15 working days
Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and... Network Control and Engineering for QoS, Security and Mobility - IFIP TC6 / WG6.2 & WG6.7 Conference on Network Control and Engineering for QoS, Security and Mobility (Net-Con 2002) October 23-25, 2002, Paris, France (Hardcover, 2003 ed.)
Dominique Gaiti, Nadia Boukhatem
R2,962 Discovery Miles 29 620 Ships in 10 - 15 working days

Service and network providers must be able to satisfy the demands for new services; improve the quality of service; reduce the cost of network service operations and maintenance; control performance; and adapt to user demands. It is essential to investigate different approaches for performing such tasks.
One of these approaches is based on policies and the capability of the network to adapt itself to current conditions. With a focus on policy-based networking, this volume addresses the problem of network control and the introduction of policies such as the control of the Quality of Service, security, mobility, performance, mobile and intelligent agents, and traffic engineering.
The area of control in networks through policies promises to provide stimulating challenges for years to come. This book is an attempt to answer questions and provide some direction about the best approaches to be followed.
This volume contains the proceedings of the first International Conference on NETwork CONtrol and Engineering (NETCON) for Quality of Service, Security and Mobility, which was sponsored by the International Federation for Information Processing (IFIP), and organized by IFIP TC6 Working Group 6.7 (Smart Networks). The conference convened in Paris, France in October 2002.

Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.): Graeme B. Dinwoodie Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.)
Graeme B. Dinwoodie
R5,444 Discovery Miles 54 440 Ships in 12 - 19 working days

This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses numerous jurisdictions across several continents, but presents these comparative studies thematically to highlight evolving commonalities and trans-border commercial practices that exist despite the lack of hard international law. The analysis presented in this book allows exploration not only of contemporary debates about the appropriate policy levers through which to regulate intermediaries, but also about the conceptual character of secondary liability rules.

Data Communications and Networking: Volume II (Hardcover): Michel Levine Data Communications and Networking: Volume II (Hardcover)
Michel Levine
R3,425 R3,095 Discovery Miles 30 950 Save R330 (10%) Ships in 10 - 15 working days
Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition): Peter Kacsuk, Thomas... Distributed and Parallel Systems - From Cluster to Grid Computing (Hardcover, 2nd Revised edition)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R4,362 Discovery Miles 43 620 Ships in 10 - 15 working days

From Cluster to Grid Computing is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. Distributed and Parallel Systems: From Cluster to Grid Computing is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable for advanced-level students in computer science.

Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R681 R608 Discovery Miles 6 080 Save R73 (11%) Ships in 10 - 15 working days
International Conference on Wireless, Intelligent, and Distributed Environment for Communication - WIDECOM 2018 (Hardcover, 1st... International Conference on Wireless, Intelligent, and Distributed Environment for Communication - WIDECOM 2018 (Hardcover, 1st ed. 2018)
Isaac Woungang, Sanjay Kumar Dhurandher
R4,394 Discovery Miles 43 940 Ships in 10 - 15 working days

This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book's structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.

Cyber Security in Business and Management (Hardcover): Stephen Mason Cyber Security in Business and Management (Hardcover)
Stephen Mason
R3,317 R3,001 Discovery Miles 30 010 Save R316 (10%) Ships in 10 - 15 working days
Enterprise Interoperability II - New Challenges and Approaches (Hardcover, 2007 ed.): Ricardo Jardim-Goncalves, Joerg Muller,... Enterprise Interoperability II - New Challenges and Approaches (Hardcover, 2007 ed.)
Ricardo Jardim-Goncalves, Joerg Muller, Kai Mertins, Martin Zelm
R8,493 Discovery Miles 84 930 Ships in 10 - 15 working days

This volume provides a concise reference to the state-of-the-art in software interoperability. Composed of over 90 papers, Enterprise Interoperability II ranges from academic research through case studies to industrial and administrative experience of interoperability. The international nature of the authorship continues to broaden. Many of the papers have examples and illustrations calculated to deepen understanding and generate new ideas.

Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.): Radhika Ranjan Roy Handbook of Mobile Ad Hoc Networks for Mobility Models (Hardcover, Edition.)
Radhika Ranjan Roy
R8,965 Discovery Miles 89 650 Ships in 12 - 19 working days

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. "Handbook of Mobile Ad Hoc Networks for Mobility Models" introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book.

"Handbook of Mobile Ad Hoc Networks for Mobility Models" is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed.... IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed. 2016)
Khaled Salah Mohamed
R2,877 R1,914 Discovery Miles 19 140 Save R963 (33%) Ships in 12 - 19 working days

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author's practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain. A SoC case study is presented to compare traditional verification with the new verification methodologies. Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; Introduce a deep introduction for Verilog for both implementation and verification point of view. Demonstrates how to use IP in applications such as memory controllers and SoC buses. Describes a new verification methodology called bug localization; Presents a novel scan-chain methodology for RTL debugging; Enables readers to employ UVM methodology in straightforward, practical terms.

Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Hardcover, 2001 ed.): Myungchul Kim, Byoungmoon Chin,... Formal Techniques for Networked and Distributed Systems - FORTE 2001 (Hardcover, 2001 ed.)
Myungchul Kim, Byoungmoon Chin, Sungwon Kang, Danhyung Lee
R5,852 Discovery Miles 58 520 Ships in 10 - 15 working days

FORTE 2001, formerly FORTE/PSTV conference, is a combined conference of FORTE (Formal Description Techniques for Distributed Systems and Communication Protocols) and PSTV (Protocol Specification, Testing and Verification) conferences. This year the conference has a new name FORTE (Formal Techniques for Networked and Distributed Systems). The previous FORTE began in 1989 and the PSTV conference in 1981. Therefore the new FORTE conference actually has a long history of 21 years. The purpose of this conference is to introduce theories and formal techniques applicable to various engineering stages of networked and distributed systems and to share applications and experiences of them. This FORTE 2001 conference proceedings contains 24 refereed papers and 4 invited papers on the subjects. We regret that many good papers submitted could not be published in this volume due to the lack of space. FORTE 2001 was organized under the auspices of IFIP WG 6.1 by Information and Communications University of Korea. It was financially supported by Ministry of Information and Communication of Korea. We would like to thank every author who submitted a paper to FORTE 2001 and thank the reviewers who generously spent their time on reviewing. Special thanks are due to the reviewers who kindly conducted additional reviews for rigorous review process within a very short time frame. We would like to thank Prof. Guy Leduc, the chairman of IFIP WG 6.1, who made valuable suggestions and shared his experiences for conference organization.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lean Startup - How to Apply the Lean…
Greg Caldwell Hardcover R635 R567 Discovery Miles 5 670
Scrum - Mastery - The Essential Guide to…
Greg Caldwell Hardcover R689 R632 Discovery Miles 6 320
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,115 R950 Discovery Miles 9 500
Blue Pelican Java
Charles E. Cook Hardcover R1,230 Discovery Miles 12 300
An Introduction to XML and Web…
Anders Moller, Michael Schwartzbach Paperback R2,721 Discovery Miles 27 210
Managing Chaos - Digital Governance by…
Lisa Welchman Paperback R975 Discovery Miles 9 750
Web Services - Concepts, Methodologies…
Information Reso Management Association Hardcover R9,718 Discovery Miles 97 180
Python for Beginners - A Programming…
Robert Campbell Hardcover R843 R731 Discovery Miles 7 310
Foundations of AOP for J2EE Development
Lionel Seinturier, Renaud Pawlak Hardcover R1,596 Discovery Miles 15 960
Web-Based Services - Concepts…
Information Reso Management Association Hardcover R18,334 Discovery Miles 183 340

 

Partners