0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (19)
  • R250 - R500 (81)
  • R500+ (1,088)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Sensor Systems and Software - Second International ICST Conference, S-Cube 2010, Miami, FL, December 13-15, 2010, Revised... Sensor Systems and Software - Second International ICST Conference, S-Cube 2010, Miami, FL, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Gerard Parr, Philip Morrow
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Sensor Systems and Software, S-Cube 2010, held in Miami, Florida, USA, in December 2010. The 17 revised full papers presented were carefully reviewed and selected and cover a wide range of topics including sensor application programming paradigms, novel sensor applications, sensor network middleware, trust security and privacy, wireless sensor network management and monitoring, and sensor application development support systems.

Forensics in Telecommunications, Information and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai,... Forensics in Telecommunications, Information and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers (Paperback, 2011 ed.)
Xuejia Lai, Dawu Gu, Bo Jin, Yong Wang, Hui Li
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.

Dependable and Historic Computing - Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday (Paperback, 2011):... Dependable and Historic Computing - Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday (Paperback, 2011)
Cliff B. Jones, John L. Lloyd
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell. The papers focus on the core of Brian Randell's work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell's love of maps. After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.

Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October... Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings (Paperback)
Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June... Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings (Paperback, Edition.)
Bart De Decker, Ingrid Schaumuller-Bichl
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly, ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of "friends," happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many new applications, ranging from smart shopping, and smart fridges to geo-localized services. In the near future, elderly people will be able to stay longer at home due to clever health monitoring systems. The sky seems to be the limit However, we have also seen the other side of the coin: viruses, Trojan horses, breaches of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encouragesecurity researchby both academia and industry and to stimulate the dissemination of results, conferences need to be organized. With the 11th edition of the joint IFIP TC-6 TC-11 Conference on C- munications and Multimedia Security (CMS 2010), the organizers resumed the tradition of previous CMS conferences after a three-year recess.

E-Government ICT Professionalism and Competences Service Science - IFIP 20th World Computer Congress, Industry Oriented... E-Government ICT Professionalism and Competences Service Science - IFIP 20th World Computer Congress, Industry Oriented Conferences, September 7-10, 2008, Milano, Italy (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Antonino Mazzeo, Roberto Bellini, Gianmario Motta
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of Industry Oriented Conferences held at IFIP 20th World Computer Congress in September 2008.

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.

New Horizons of Parallel and Distributed Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005): Minyi Guo,... New Horizons of Parallel and Distributed Computing (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Minyi Guo, Laurence Tianruo Yang
R4,026 Discovery Miles 40 260 Ships in 18 - 22 working days

Parallel and distributed computing is one of the foremost technologies for shaping
future research and development activities in academia and industry. Hyperthreading in Intel processors, hypertransport links in next generation AMD processors, multicore silicon in today's high-end microprocessors, and emerging cluster and grid computing have moved parallel/distributed computing into the mainstream of computing.

New Horizons of Parallel and Distributed Computing is a collection of self-contained chapters written by pioneering researchers to provide solutions for newly emerging problems in this field. This volume will not only provide novel ideas, work in progress and state-of-the-art techniques in the field, but will also stimulate future research activities in the area of parallel and distributed computing with applications.

New Horizons of Parallel and Distributed Computing is intended for industry researchers and developers, as well as for academic researchers and advanced-level students in computer science and electrical engineering. A valuable reference work, it is also suitable as a textbook.

Compiling with Continuations (Paperback, Revised): Andrew W. Appel Compiling with Continuations (Paperback, Revised)
Andrew W. Appel
R2,388 Discovery Miles 23 880 Ships in 10 - 15 working days

The control and data flow of a program can be represented using continuations, a concept from denotational semantics that has practical application in real compilers. This book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. Continuations can be used to compile most programming languages. The method is illustrated in a compiler for the programming language Standard ML. However, prior knowledge of ML is not necessary, as the author carefully explains each concept as it arises. This is the first book to show how concepts from the theory of programming languages can be applied to the producton of practical optimising compilers for modern languages like ML. This book will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.

Advances in Grid and Pervasive Computing - 5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010,... Advances in Grid and Pervasive Computing - 5th International Conference, CPC 2010, Hualien, Taiwan, May 10-13, 2010, Proceedings (Paperback, 2010 ed.)
Paolo Bellavista, Ruay-Shiung Chang, Han-Chieh Chao, Shin-Feng Lin, Peter M. A. Sloot
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

Grid and Pervasive Computing (GPC) is an annual international conference on the emerging areas of grid computing and pervasive computing, aimed at p- viding an exciting platform and paradigm for all-the-time, everywhere services. GPC 2010 provided a high-pro?le, leading-edgeforum for researchersand dev- opers from industry and academia to present their latest research in the ?eld of grid and pervasive computing. Three workshops were held in conjunction with the GPC 2010 conference: * The First International Workshop on Intelligent Management of Networked Environment (IMNE 2010) * International Workshop on Multimedia Applications for Cloud (MAC 2010) * The 6thInternationalWorkshopon Mobile Commerce andServices (WMCS 2010) The proceedingsof these workshoparealso included in this volume. We received 184 papers originating from 22 countries. The Program Committee ?nally - lected 67 papers for presentation at the conference and inclusion in this LNCS volume. At GPC 2010, we were very pleased to have four distinguished invited speakers, who delivered state-of-the-art information on the conference topics: * A grid based virtual laboratory for HIV drugranking by Peter Sloot (U- versity of Amsterdam, The Netherlands) * Solving the scalability dilemma with clouds, crowds, and algorithms by Michael J. Franklin (University of California, Berkeley, USA) * The trend of cloud computing - from industry's perspective by Enwei Xie (Microsoft Greater China Region, China) * Towards ubiquitous a?ective learning by Bin Hu (The Birmingham City University, UK) Theconferencewouldnothavebeenpossiblewithoutthesupportofmanypeople andorganizationsthathelped invariouswaysto makeita success.

Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback,... Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback, Edition.)
Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe
R1,739 Discovery Miles 17 390 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011,... Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings (Paperback, Edition.)
Udaya Parampalli, Philip Hawkes
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Classic Operating Systems - From Batch Processing to Distributed Systems (Paperback, Softcover reprint of hardcover 1st ed.... Classic Operating Systems - From Batch Processing to Distributed Systems (Paperback, Softcover reprint of hardcover 1st ed. 2001)
Per Brinch Hansen
R2,777 Discovery Miles 27 770 Ships in 18 - 22 working days

This remarkable anthology allows the pioneers who orchestrated the major breakthroughs in operating system technology to describe their work in their own words. From the batch processing systems of the 1950s to the distributed systems of the 1990s, Tom Kilburn, David Howarth, Bill Lynch, Fernando Corbato, Robert Daley, Sandy Fraser, Dennis Ritchie, Ken Thompson, Edsger Dijkstra, Per Brinch Hansen, Soren Lauesen, Barbara Liskov, Joe Stoy, Christopher Strachey, Butler Lampson, David Redell, Brian Randell, Andrew Tanenbaum, and others describe the systems they designed. The volume details such classic operating systems as the Atlas, B5000, Exec II, Egdon, CTSS, Multics, Titan, Unix, THE, RC 4000, Venus, Boss 2, Solo, OS 6, Alto, Pilot, Star, WFS, Unix United, and Amoeba systems. An introductory essay on the evolution of operating systems summarizes the papers and helps puts them into a larger perspective. This provocative journey captures the historic contributions of operating systems to software design, concurrent programming, graphic user interfaces, file systems, personal computing, and distributed systems. It also fully portrays how operating systems designers think. It's ideal for everybody in the field, from students to professionals, academics to enthusiasts.

Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003): Axel Jantsch, Hannu Tenhunen Networks on Chip (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Axel Jantsch, Hannu Tenhunen
R4,223 Discovery Miles 42 230 Ships in 18 - 22 working days

Networks on Chip presents a variety of topics, problems and approaches with the common theme to systematically organize the on-chip communication in the form of a regular, shared communication network on chip, an NoC for short.

As the number of processor cores and IP blocks integrated on a single chip is steadily growing, a systematic approach to design the communication infrastructure becomes necessary. Different variants of packed switched on-chip networks have been proposed by several groups during the past two years. This book summarizes the state of the art of these efforts and discusses the major issues from the physical integration to architecture to operating systems and application interfaces. It also provides a guideline and vision about the direction this field is moving to. Moreover, the book outlines the consequences of adopting design platforms based on packet switched network. The consequences may in fact be far reaching because many of the topics of distributed systems, distributed real-time systems, fault tolerant systems, parallel computer architecture, parallel programming as well as traditional system-on-chip issues will appear relevant but within the constraints of a single chip VLSI implementation.

The book is organized in three parts. The first deals with system design and methodology issues. The second presents problems and solutions concerning the hardware and the basic communication infrastructure. Finally, the third part covers operating system, embedded software and application. However, communication from the physical to the application level is a central theme throughout the book.

The book serves as an excellent reference source and may be used as a text for advanced courses on the subject.

From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005): Achim Rettberg,... From Specification to Embedded Systems Application (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Achim Rettberg, Mauro C. Zanella, Franz J. Rammig
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase.

Synergy effects resulting from distributed application functionalities via several electronic control devies, exchanging information through the network brings about more complex system architectures with many different sub-networks, operating with different velocities and different protocol implementations.

To manage the increasing complexity of these systems, a deterministic behaviour of the control units and the communication network must be provided for, in particular when dealing with a distributed functionality.

From Specification to Embedded Systems Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), which was held in August 2005 in Manaus (Brazil) and sponsored by the International Federation for Information Processing (IFIP).

The topics which have been chosen for this working conference are very timely: design methodology, modeling, specification, software synthesis, power management, formal verification, testing, network, communication systems, distributed control systems, resource management and special aspects in system design.

NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011, Proceedings (Paperback,... NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011, Proceedings (Paperback, Edition.)
Mihaela Bobaru, Klaus Havelund, Gerard Holzmann, Rajeev Joshi
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Symposium on NASA Formal Methods, NFM 2011, held in Pasadena, CA, USA, in April 2011.
The 26 revised full papers presented together with 12 tool papers, 3 invited talks, and 2 invited tutorials were carefully reviewed and selected from 141 submissions. The topics covered by NFM 2011 included but were not limited to: theorem proving, logic model checking, automated testing and simulation, model-based engineering, real-time and stochastic systems, SAT and SMT solvers, symbolic execution, abstraction and abstraction refinement, compositional verification techniques; static and dynamic analysis techniques, fault protection, cyber security, specification formalisms, requirements analysis, and applications of formal techniques.

Extreme Programming Pocket Guide (Paperback): Chromatic Extreme Programming Pocket Guide (Paperback)
Chromatic
R420 R383 Discovery Miles 3 830 Save R37 (9%) Ships in 18 - 22 working days

The Extreme Programming Pocket Guide covers XP assumptions, principles, events, artifacts, roles, and resources, and more. It concisely explains the relationships between the XP practices. If you want to adopt XP in stages, the Extreme Programming Pocket Guide will help you choose what to apply and when. Concise and easy to use, this handy pocket guide to XP is a must-have quick reference for anyone implementing a test-driven development environment.

Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007):... Distributed and Parallel Systems - From Cluster to Grid Computing (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Peter Kacsuk, Thomas Fahringer, Zsolt Nemeth
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. This book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.

SIMD Programming Manual for Linux and Windows (Paperback, Softcover reprint of hardcover 1st ed. 2004): Paul Cockshott, Kenneth... SIMD Programming Manual for Linux and Windows (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Paul Cockshott, Kenneth Renfrew
R3,811 Discovery Miles 38 110 Ships in 18 - 22 working days

A number of widely used contemporary processors have instruction-set extensions for improved performance in multi-media applications. The aim is to allow operations to proceed on multiple pixels each clock cycle. Such instruction-sets have been incorporated both in specialist DSPchips such as the Texas C62xx (Texas Instruments, 1998) and in general purpose CPU chips like the Intel IA32 (Intel, 2000) or the AMD K6 (Advanced Micro Devices, 1999). These instruction-set extensions are typically based on the Single Instruc tion-stream Multiple Data-stream (SIMD) model in which a single instruction causes the same mathematical operation to be carried out on several operands, or pairs of operands, at the same time. The level or parallelism supported ranges from two floating point operations, at a time on the AMD K6 architecture to 16 byte operations at a time on the Intel P4 architecture. Whereas processor architectures are moving towards greater levels of parallelism, the most widely used programming languages such as C, Java and Delphi are structured around a model of computation in which operations takeplace on a single value at a time. This was appropriate when processors worked this way, but has become an impediment to programmers seeking to make use of the performance offered by multi-media instruction -sets. The introduction of SIMD instruction sets (Peleg et al."

Distributed Services with OpenAFS - for Enterprise and Education (Paperback, Softcover reprint of hardcover 1st ed. 2007):... Distributed Services with OpenAFS - for Enterprise and Education (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Franco Milicchio, Wolfgang Alexander Gehrke
R1,553 Discovery Miles 15 530 Ships in 18 - 22 working days

This book shows in detail how to build enterprise-level secure, redundant, and highly scalable services from scratch on top of the open source Linux operating system, suitable for small companies as well as big universities. The core architecture presented is based on Kerberos, LDAP, AFS, and Samba. Coverage shows how to integrate web, message related, data base and other services with this backbone. This architecture provides a Single-Sign-On solution for different client platforms and can also be employed for clustering. Although it is implemented with Debian GNU/Linux, the content can be applied to other UNIX flavors.

Reliable Distributed Systems - Technologies, Web Services, and Applications (Paperback, Softcover reprint of hardcover 1st ed.... Reliable Distributed Systems - Technologies, Web Services, and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Kenneth Birman
R2,357 Discovery Miles 23 570 Ships in 18 - 22 working days

Explains fault tolerance in clear terms, with concrete examples drawn from real-world settings
Highly practical focus aimed at building "mission-critical" networked applications that remain secure

Grid and Distributed Computing - International Conference, GDC 2009, Held as Part of the Future Generation Information... Grid and Distributed Computing - International Conference, GDC 2009, Held as Part of the Future Generation Information Technology Conferences, FGIT 2009, Jeju Island, Korea, December 10-12, 2009, Proceedings (Paperback, 2010 ed.)
Dominik Slezak, Tai-Hoon Kim, Stephen S.-T. Yau, Osvaldo Gervasi, Byeong Ho Kang
R1,395 Discovery Miles 13 950 Ships in 18 - 22 working days

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle can be discovered, which has the propensity to propagate throughout mul- faceted disciplines. FGIT 2009 was the first mega-conference that attempted to follow the above idea of hybridization in FGIT in a form of multiple events related to particular disciplines of IT, conducted by separate scientific committees, but coordinated in order to expose the most important contributions. It included the following international conferences: Advanced Software Engineering and Its Applications (ASEA), Bio-Science and Bio-Technology (BSBT), Control and Automation (CA), Database Theory and Application (DTA), D- aster Recovery and Business Continuity (DRBC; published independently), Future G- eration Communication and Networking (FGCN) that was combined with Advanced Communication and Networking (ACN), Grid and Distributed Computing (GDC), M- timedia, Computer Graphics and Broadcasting (MulGraB), Security Technology (SecTech), Signal Processing, Image Processing and Pattern Recognition (SIP), and- and e-Service, Science and Technology (UNESST).

Architecting Dependable Systems VI (Paperback, 2009 ed.): Rogerio De Lemos, Jean-Charles Fabre, Cristina Gacek, Fabio Gadducci,... Architecting Dependable Systems VI (Paperback, 2009 ed.)
Rogerio De Lemos, Jean-Charles Fabre, Cristina Gacek, Fabio Gadducci, Maurice H. ter Beek
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

As software systems become increasingly ubiquitous, issues of dependability become ever more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability and security are addressed at the architectural level. This book has originated from an effort to bring together the research communities of software architectures, dependability and security.

This state-of-the-art survey contains expanded and peer-reviewed papers based on the carefully selected contributions to two workshops: the Workshop on Architecting Dependable Systems (WADS 2008), organized at the 2008 International Conference on Dependable Systems and Networks (DSN 2008), held in Anchorage, Alaska, USA, in June 2008, and the Third International Workshop on Views On Designing Complex Architectures (VODCA 2008) held in Bertinoro, Italy, in August 2008. It also contains invited papers written by recognized experts in the area. The 13 papers are organized in topical sections on dependable service-oriented architectures, fault-tolerance and system evaluation, and architecting security.

Web Content Caching and Distribution - Proceedings of the 8th International Workshop (Paperback, Softcover reprint of hardcover... Web Content Caching and Distribution - Proceedings of the 8th International Workshop (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Fred Douglis, Brian D Davison
R4,030 Discovery Miles 40 300 Ships in 18 - 22 working days

Web caching and content delivery technologies provide the infrastructure on which systems are built for the scalable distribution of information. This proceedings of the eighth annual workshop, captures a cross-section of the latest issues and techniques of interest to network architects and researchers in large-scale content delivery. Topics covered include the distribution of streaming multimedia, edge caching and computation, multicast, delivery of dynamic content, enterprise content delivery, streaming proxies and servers, content transcoding, replication and caching strategies, peer-to-peer content delivery, and Web prefetching.
Web Content Caching and Distribution encompasses all areas relating to the intersection of storage and networking for Internet content services. The book is divided into eight parts: mobility, applications, architectures, multimedia, customization, peer-to-peer, performance and measurement, and delta encoding.

Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009): George... Security and Dependability for Ambient Intelligence (Paperback, Softcover reprint of hardcover 1st ed. 2009)
George Spanoudakis, Spyros Kokolakis
R4,041 Discovery Miles 40 410 Ships in 18 - 22 working days

Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms.

An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems.

Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering.

Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998): Jan Wikander, Bertil... Real-Time Systems in Mechatronic Applications (Paperback, Softcover reprint of the original 1st ed. 1998)
Jan Wikander, Bertil Svensson
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Real-Time Systems in Mechatronic Applications brings together in one place important contributions and up-to-date research results in this fast moving area. Real-Time Systems in Mechatronic Applications serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
uC/OS-III - The Real-Time Kernel
Jean J. Labrosse Hardcover R1,809 Discovery Miles 18 090
Microsoft Forefront Security…
Jesse Varsalone Paperback R1,129 R878 Discovery Miles 8 780
The Continuing Arms Race - Code-Reuse…
Per Larsen, Ahmad-Reza Sadeghi Hardcover R2,482 Discovery Miles 24 820
A C/OS-III for the Renesas RX62N
J Labrosse Jean, Kovalski Fabiano Hardcover R1,817 Discovery Miles 18 170
Biometric Technologies and Verification…
John Vacca Paperback R1,586 Discovery Miles 15 860
The Networknomicon, or SNMP Mastery
Michael W Lucas, Abdul Alhazred Hardcover R1,436 R1,247 Discovery Miles 12 470
See MIPS Run
Dominic Sweetman Paperback R1,680 Discovery Miles 16 800
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Topology in Process Calculus…
Mingsheng Ying Hardcover R1,527 Discovery Miles 15 270

 

Partners