0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (19)
  • R250 - R500 (77)
  • R500+ (1,102)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, September 7-9,... Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis
R1,480 Discovery Miles 14 800 Ships in 18 - 22 working days

This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.

Advanced Parallel Processing Technologies - 9th International Symposium, APPT 2011, Shanghai, China, September 26-27, 2011,... Advanced Parallel Processing Technologies - 9th International Symposium, APPT 2011, Shanghai, China, September 26-27, 2011, Proceedings (Paperback, 2011)
Olivier Temam, Pen-Chung Yew, Binyu Zang
R1,721 Discovery Miles 17 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Symposium on Advanced Parallel Processing Technologies, APPT 2011, held in Shanghai, China, in September 2011. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on parallel distributed system architectures, architecture, parallel application and software, distributed and cloud computing.

PC Viruses - Detection, Analysis and Cure (Paperback, Softcover reprint of the original 1st ed. 1991): Alan Solomon PC Viruses - Detection, Analysis and Cure (Paperback, Softcover reprint of the original 1st ed. 1991)
Alan Solomon
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

PC viruses are not necessarily a major disaster despite what is sometimes written about them. But a virus infection is at the very least a nuisance, and potentially can lead to loss of data. Quite often it is the user's panic reaction to discovering a virus infection that does more than the virus itself. This book demystifies PC viruses, providing clear, accurate information about this relatively new PC problem. It enables managers and PC users to formulate an appropriate response; adequate for prevention and cure, but not `over the top'. Over 100 PC viruses and variants are documented in detail. You are told how to recognise each one, what it does, how it copies itself, and how to get rid of it. Other useful and relevant technical information is also provided. Strategies for dealing with potential and actual virus outbreaks are described for business, academic and other environments, with the emphasis on sensible but not unreasonable precautions. All users of IBM PC or compatible computers - from single machines to major LAN's - will find this book invaluable. All that is required is a working knowledge of DOS. Dr. Alan Solomon has been conducting primary research into PC viruses since they first appeared, and has developed the best-selling virus protection software Dr. Solomon's Anti-Virus Toolkit.

Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October... Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings (Paperback)
Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011,... Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011, Proceedings, Part II (Paperback, 2011 ed.)
Emmanuel Jeannot, Raymond Namyst, Jean Roman
R1,461 Discovery Miles 14 610 Ships in 18 - 22 working days

The two-volume set LNCS 6852/6853 constitutes the refereed proceedings of the 17th International Euro-Par Conference held in Bordeaux, France, in August/September 2011.The 81 revised full papers presented were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load-balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and mobile ubiquitous computing.

Parallel Machines: Parallel Machine Languages - The Emergence of Hybrid Dataflow Computer Architectures (Paperback, Softcover... Parallel Machines: Parallel Machine Languages - The Emergence of Hybrid Dataflow Computer Architectures (Paperback, Softcover reprint of the original 1st ed. 1990)
Robert A. Iannucci
R3,995 Discovery Miles 39 950 Ships in 18 - 22 working days

It is universally accepted today that parallel processing is here to stay but that software for parallel machines is still difficult to develop. However, there is little recognition of the fact that changes in processor architecture can significantly ease the development of software. In the seventies the availability of processors that could address a large name space directly, eliminated the problem of name management at one level and paved the way for the routine development of large programs. Similarly, today, processor architectures that can facilitate cheap synchronization and provide a global address space can simplify compiler development for parallel machines. If the cost of synchronization remains high, the pro gramming of parallel machines will remain significantly less abstract than programming sequential machines. In this monograph Bob Iannucci presents the design and analysis of an architecture that can be a better building block for parallel machines than any von Neumann processor. There is another very interesting motivation behind this work. It is rooted in the long and venerable history of dataflow graphs as a formalism for ex pressing parallel computation. The field has bloomed since 1974, when Dennis and Misunas proposed a truly novel architecture using dataflow graphs as the parallel machine language. The novelty and elegance of dataflow architectures has, however, also kept us from asking the real question: "What can dataflow architectures buy us that von Neumann ar chitectures can't?" In the following I explain in a round about way how Bob and I arrived at this question."

Dependable Networks and Services - 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and... Dependable Networks and Services - 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012, Proceedings (Paperback)
Ramin Sadre, Jiri Novotny, Pavel Celeda, Martin Waldburger, Burkhard Stiller
R1,376 Discovery Miles 13 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security.

Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011,... Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings (Paperback, Edition.)
Udaya Parampalli, Philip Hawkes
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011,... Euro-Par 2011 Parallel Processing - 17th International Euro-ParConference, Bordeaux, France, August 29 - September 2, 2011, Proceedings, Part I (Paperback, 2011 ed.)
Emmanuel Jeannot, Raymond Namyst, Jean Roman
R1,498 Discovery Miles 14 980 Ships in 18 - 22 working days

The two-volume set LNCS 6852/6853 constitutes the refereed proceedings of the 17th International Euro-Par Conference held in Bordeaux, France, in August/September 2011. The 81 revised full papers presented were carefully reviewed and selected from 271 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load-balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance networks and mobile ubiquitous computing.

Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback,... Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback, Edition.)
Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe
R1,739 Discovery Miles 17 390 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network... Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Comuuter Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012, Proceedings (Paperback, 2012 ed.)
Igor Kotenko, Victor Skormin
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, held in St. Petersburg, Russia in October 2012. The 14 revised full papers and 8 revised short presentations were carefully reviewed and selected from a total of 44 submissions. The papers are organized in topical sections on applied cryptography and security protocols, access control and information protection, security policies, security event and information management, instrusion prevention, detection and response, anti-malware techniques, security modeling and cloud security.

Foundations of Real-Time Computing: Formal Specifications and Methods (Paperback, Softcover reprint of the original 1st ed.... Foundations of Real-Time Computing: Formal Specifications and Methods (Paperback, Softcover reprint of the original 1st ed. 1991)
Andre M.Van Tilborg, Gary M. Koob
R4,021 Discovery Miles 40 210 Ships in 18 - 22 working days

This volume contains a selection of papers that focus on the state-of the-art in formal specification and verification of real-time computing systems. Preliminary versions of these papers were presented at a workshop on the foundations of real-time computing sponsored by the Office of Naval Research in October, 1990 in Washington, D. C. A companion volume by the title Foundations of Real-Time Computing: Scheduling and Resource Management complements this hook by addressing many of the recently devised techniques and approaches for scheduling tasks and managing resources in real-time systems. Together, these two texts provide a comprehensive snapshot of current insights into the process of designing and building real time computing systems on a scientific basis. The notion of real-time system has alternative interpretations, not all of which are intended usages in this collection of papers. Different communities of researchers variously use the term real-time to refer to either very fast computing, or immediate on-line data acquisition, or deadline-driven computing. This text is concerned with the formal specification and verification of computer software and systems whose correct performance is dependent on carefully orchestrated interactions with time, e. g., meeting deadlines and synchronizing with clocks. Such systems have been enabled for a rapidly increasing set of diverse end-uses by the unremitting advances in computing power per constant-dollar cost and per constant-unit-volume of space. End use applications of real-time computers span a spectrum that includes transportation systems, robotics and manufacturing, aerospace and defense, industrial process control, and telecommunications."

A System Administrator's Guide to Sun Workstations (Paperback, Softcover reprint of the original 1st ed. 1991): George... A System Administrator's Guide to Sun Workstations (Paperback, Softcover reprint of the original 1st ed. 1991)
George Becker, Kathy Slattery
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

This Guide to Sun Administration is areference manual written by Sun administrators for Sun administrators. The book is not in tended to be a complete guide to UNIX Systems Administration; instead it will concentrate on the special issues that are particular to the Sun environment. It will take you through the basic steps necessary to install and maintain a network of Sun computers. Along the way, helpful ideas will be given concerning NFS, YP, backup and restore procedures, as well as many useful installation tips that can make a system administrator's job less painful. Spe cifically, SunGS 4.0 through 4.0.3 will be studied; however, many ofthe ideas and concepts presented are generic enough to be used on any version of SunGS. This book is not intended to be basic introduction to SunGS. It is assumed thatthe reader will have at least a year ofexperience supporting UNIX. BookOverview The firstchaptergives adescription ofthe system types thatwill be discussed throughout the book. An understanding of all of the system types is needed to comprehend the rest ofthe book. Chapter 2 provides the information necessary to install a workstation. The format utility and the steps involved in the suninstall process are covered in detail. Ideas and concepts about partitioning are included in this chapter. YP is the topic of the third chapter. A specific description of each YPmap and each YPcommand ispresented, along with some tips about ways to best utilize this package in your environment.

Implementations of Logic Programming Systems (Paperback, Softcover reprint of the original 1st ed. 1994): Evan Tick, Giancarlo... Implementations of Logic Programming Systems (Paperback, Softcover reprint of the original 1st ed. 1994)
Evan Tick, Giancarlo Succi
R2,648 Discovery Miles 26 480 Ships in 18 - 22 working days

In conjunction with the 1993 International Conference on Logic Programming (ICLP'93), held in Budapest Hungary, two workshops were held concerning the implementations of logic programming systems: Practical Implementations and Sys- tems Experience in Logic Programming Systems, and Concurrent, Distributed, and Parallel Implementations of Logic Programming Systems. This collection presents 16 research papers in the area of the implementation of logic programming systems. The two workshops aimed to bring together sys- tems implementors for discussing real problems coming from their direct experience, therefore these papers have a special emphasis on practice rather than on theory. This book will be of immediate interest to practitioners who seek understanding of how to efficiently manage memory, generate fast code, perform sophisticated static analyses, and design high-performance runtime features. A major theme, throughout the papers, is how to effectively leverage host imple- mentation systems and technologies to implement target systems. Debray discusses implementing Janus in SICStus Prolog by exploiting the delay primitive, which is fur- ther expounded by Meier in his discussion of various ECRC systems implementations of delay primitives. Hausman discusses implementing Erlang in C, and Czajkowski and Zielinski discuss embedding Linda primitives in Strand. Denti et ai. discuss implementing object-oriented logic programs within SICStus Prolog, a theme also explored and compared to a WAM-based implementation by Bugliesi and Nardiello.

Search Based Software Engineering - Fourth International Symposium, SSBSE 2012, Riva del Garda, September 28-30, 2012,... Search Based Software Engineering - Fourth International Symposium, SSBSE 2012, Riva del Garda, September 28-30, 2012, Proceedings (Paperback, 2012 ed.)
Gordon Fraser, Jerffeson Teixeira De Souza
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Fourth International Symposium on Search-Based Software Engineering, SSBSE 2012, held in Riva del Garda, Italy in collocation with the 28th IEEE International Conference on Software Maintenance. The 15 revised full papers, 3 revised short papers, and 2 papers of the graduate track presented together with 2 keynote talks and 1 tutorial paper were carefully reviewed and selected from 38 initial submissions. Search-based Software Engineering (SBSE) studies the application of meta-heuristic optimization techniques to various software engineering problems, ranging from requirements engineering to software testing and maintenance. The papers present current research in all areas of Search Based Software Engineering, including theoretical work, research on SBSE applications, empirical studies, and reports on industrial experience.

Multicore Software Engineering, Performance and Tools - International Conference, MSEPT 2012, Prague, Czech Republic, May... Multicore Software Engineering, Performance and Tools - International Conference, MSEPT 2012, Prague, Czech Republic, May 31--June 1, 2012, Proceedings (Paperback, 2012)
Victor Pankratius, Michael Philippsen
R1,696 Discovery Miles 16 960 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which are short papers were carefully reviewed and selected from 24 submissions. The papers address new work on optimization of multicore software, program analysis, and automatic parallelization. They also provide new perspectives on programming models as well as on applications of multicore systems.

Software Engineering for Resilient Systems - Fourth International Workshop, SERENE 2012, Pisa, Italy, September 27-28, 2012,... Software Engineering for Resilient Systems - Fourth International Workshop, SERENE 2012, Pisa, Italy, September 27-28, 2012, Proceedings (Paperback, 2012 ed.)
Paris Avgeriou
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Fourth International Workshop on Software Engineering for Resilient Systems, SERENE 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers were carefully reviewed and selected from numerous submissions. The papers address all aspects of fault tolerance and exception handling, safety modeling, supporting evolution, resilience in service-oriented computing, and applying formal methods in case studies.

Advances in Grid and Pervasive Computing - 7th International Conference, GPC 2012, Hong Kong, China, May 11-13, 2012,... Advances in Grid and Pervasive Computing - 7th International Conference, GPC 2012, Hong Kong, China, May 11-13, 2012, Proceedings (Paperback)
Ruixuan Li, Jiannong Cao, Julien Bourgeois
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Grid and Pervasive Computing, GPC 2012, held in Hong Kong, China, in May 2012. The 9 revised full papers and 19 short papers were carefully revised and selected from 55 submissions. They are organized in topical sections on cloud computing, grid and service computing, green computing, mobile and pervasive computing, scheduling and performance, and trust and security. Also included are 4 papers presented at the 2012 International Workshop on Mobile Cloud and Ubiquitous Computing (Mobi-Cloud 2012) held in conjunction with GPC 2012.

Specification and Analysis of Concurrent Systems - The COSY Approach (Paperback, Softcover reprint of the original 1st ed.... Specification and Analysis of Concurrent Systems - The COSY Approach (Paperback, Softcover reprint of the original 1st ed. 1992)
Ryszard Janicki, Peter E. Lauer
R2,724 Discovery Miles 27 240 Ships in 18 - 22 working days

Concurrent systems abound in human experience but their fully adequate conceptualization as yet eludes our most able thinkers. The COSY (ConcurrentSystem) notation and theory was developed in the last decade as one of a number of mathematical approaches for conceptualizing and analyzing concurrent and reactive systems. The COSY approach extends theconventional notions of grammar and automaton from formal language and automata theory to collections of "synchronized" grammars and automata, permitting system specification and analysis of "true" concurrency without reduction to non-determinism. COSY theory is developed to a great level of detail and constitutes the first uniform and self-contained presentationof all results about COSY published in the past, as well as including many new results. COSY theory is used to analyze a sufficient number of typical problems involving concurrency, synchronization and scheduling, to allow the reader to apply the techniques presented tosimilar problems. The COSY model is also related to many alternative models of concurrency, particularly Petri Nets, Communicating Sequential Processes and the Calculus of Communicating Systems.

Solid Modeling by Computers - From Theory to Applications (Paperback, Softcover reprint of the original 1st ed. 1984): Mary S.... Solid Modeling by Computers - From Theory to Applications (Paperback, Softcover reprint of the original 1st ed. 1984)
Mary S. Pickett, John W. Boyse
R1,463 Discovery Miles 14 630 Ships in 18 - 22 working days

This book contains the papers presented at the international research sympo sium "Solid Modeling by Computers: From Theory to Applications," held at the General Motors Research Laboratories on September 25-27, 1983. This was the 28th syposium in aseries which the Research Laboratories began sponsor ing in 1957. Each symposium has focused on a topic that is both under active study at the Research Laboratories and is also of interest to the larger technical community. Solid modeling is still a very young research area, young even when com pared with other computer-related research fields. Ten years ago, few people recognized the importance of being able to create complete and unambiguous computer models of mechanical parts. Today there is wide recognition that computer representations of solids are aprerequisite for the automation of many engineering analyses and manufacturing applications. In September 1983, the time was ripe for a symposium on this subject. Re search had already demonstrated the efficacy of solid modeling as a tool in computer automated design and manufacturing, and there were significant re suIts wh ich could be presented at the symposium. Yet the field was still young enough that we could bring together theorists in solid modeling and practition ers applying solid modeling to other research areas in a group sm all enough to allow a stimulating exchange of ideas."

Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011 and 4th International... Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers (Paperback, 2012)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina de Capitani di Vimercati
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.

Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002): Robert Graybill, Rami Melhem Power Aware Computing (Paperback, Softcover reprint of hardcover 1st ed. 2002)
Robert Graybill, Rami Melhem
R5,200 Discovery Miles 52 000 Ships in 18 - 22 working days

With the advent of portable and autonomous computing systems, power con sumption has emerged as a focal point in many research projects, commercial systems and DoD platforms. One current research initiative, which drew much attention to this area, is the Power Aware Computing and Communications (PAC/C) program sponsored by DARPA. Many of the chapters in this book include results from work that have been supported by the PACIC program. The performance of computer systems has been tremendously improving while the size and weight of such systems has been constantly shrinking. The capacities of batteries relative to their sizes and weights has been also improv ing but at a rate which is much slower than the rate of improvement in computer performance and the rate of shrinking in computer sizes. The relation between the power consumption of a computer system and it performance and size is a complex one which is very much dependent on the specific system and the technology used to build that system. We do not need a complex argument, however, to be convinced that energy and power, which is the rate of energy consumption, are becoming critical components in computer systems in gen eral, and portable and autonomous systems, in particular. Most of the early research on power consumption in computer systems ad dressed the issue of minimizing power in a given platform, which usually translates into minimizing energy consumption, and thus, longer battery life."

Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems (Paperback, Softcover reprint of hardcover 1st... Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Bharadwaj Veeravalli, Gerassimos Barlas
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Several works on multimedia storage appear in literature today, but very little if any, have been devoted to handling long duration video retrieval, over large scale networks. Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in rendering high-quality, high-fidelity, and cost-effective services for network service providers.

Distributed Multimedia Retrieval Strategies for Large Scale Networked Systems presents an up-to-date research status in the domain of distributed video retrieval. This professional book will include several different techniques that are in place for long duration video retrieval. An experimentally tested technology under the JINI platform, demonstrates a practical working system which serves as a feasibility study, as well as the first step in realizing such a technology.

Automated Theorem Proving in Software Engineering (Paperback, Softcover reprint of hardcover 1st ed. 2001): D. Loveland Automated Theorem Proving in Software Engineering (Paperback, Softcover reprint of hardcover 1st ed. 2001)
D. Loveland; Johann M. Schumann
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Growing demands for the quality, safety, and security of software can only be satisfied by the rigorous application of formal methods during software design. This book methodically investigates the potential of first-order logic automated theorem provers for applications in software engineering. Illustrated by complete case studies on protocol verification, verification of security protocols, and logic-based software reuse, this book provides techniques for assessing the prover's capabilities and for selecting and developing an appropriate interface architecture.

Dependable and Historic Computing - Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday (Paperback, 2011):... Dependable and Historic Computing - Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday (Paperback, 2011)
Cliff B. Jones, John L. Lloyd
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell. The papers focus on the core of Brian Randell's work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell's love of maps. After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pharmaceutical Engineering
Dulal Krishna Tripathi, Nirmalya Tripathi Hardcover R1,635 Discovery Miles 16 350
Medicinal Chemistry of Anticancer Drugs
Carmen AvendaƱo, J. Carlos MenƩndez Paperback R3,987 Discovery Miles 39 870
Pharmacology In Clinical Practice…
Gustav Schellack Paperback R403 Discovery Miles 4 030
Pharmacokinetics and Toxicokinetic…
Rakesh Kumar Tekade Hardcover R4,025 Discovery Miles 40 250
Tamoxifen Tales - Suggestions for…
V.Craig Jordan Hardcover R2,083 Discovery Miles 20 830
Pharmacy Practice - Essentials of…
Sanjaykumar B Bari, Vishal C Gurumukhi, … Hardcover R1,117 Discovery Miles 11 170
Tailor-Made Polysaccharides in…
Amit Kumar Nayak, Md Saquib Hasnain, … Paperback R3,934 Discovery Miles 39 340
Tailor-Made Polysaccharides in Drug…
Amit Kumar Nayak, Md Saquib Hasnain Paperback R3,975 Discovery Miles 39 750
Targeted Nanomedicine for Breast Cancer…
Shivani Rai Paliwal, Rishi Paliwal Paperback R4,491 Discovery Miles 44 910
Orphan Drugs - Understanding the Rare…
Elizabeth Hernberg-Stahl, Miroslav Reljanović Hardcover R4,210 Discovery Miles 42 100

 

Partners