0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (31)
  • R250 - R500 (84)
  • R500+ (1,130)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005,... Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days


This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.

The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Architecture of Computing Systems - ARCS 2006 - 19th International Conference, Frankfurt/Main, Germany, March 13-16, 2006,... Architecture of Computing Systems - ARCS 2006 - 19th International Conference, Frankfurt/Main, Germany, March 13-16, 2006, Proceedings (Paperback, 2006 ed.)
Werner Grass, Bernhard Sick, Klaus Waldschmidt
R1,692 Discovery Miles 16 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Architecture of Computing Systems, ARCS 2006, held in March 2006. The 32 revised full papers presented together with two invited and keynote papers were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on pervasive computing, memory systems, architectures, multiprocessing, energy efficient design, power awareness, network protocols, security, and distributed networks.

Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006,... Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006 ed.)
Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
R1,630 Discovery Miles 16 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.

Compiler Construction - 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and... Compiler Construction - 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 30-31, 2006, Proceedings (Paperback, 2006 ed.)
Alan Mycroft, Andreas Zeller
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Compiler Construction, CC 2006, held in March 2006 as part of ETAPS. The 17 revised full papers presented together with three tool demonstration papers and one invited paper were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections.

Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised... Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers (Paperback, 2006 ed.)
Alfonso Valdes, Diego Zamboni
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection held in September 2005. The 15 revised full papers and two practical experience reports were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on worm detection and containment, anomaly detection, intrusion prevention and response, intrusion detection based on system calls and network-based, as well as intrusion detection in mobile and wireless networks.

User Interface Design for Programmers (Paperback, Softcover reprint of the original 1st ed.): Avram Joel Spolsky User Interface Design for Programmers (Paperback, Softcover reprint of the original 1st ed.)
Avram Joel Spolsky
R1,514 R1,193 Discovery Miles 11 930 Save R321 (21%) Ships in 10 - 15 working days

Most programmers' fear of user interface (UI) programming comes from their fear of doing UI design. They think that UI design is like graphic designthe mysterious process by which creative, latte-drinking, all-black-wearing people produce cool-looking, artistic pieces. Most programmers see themselves as analytic, logical thinkers insteadstrong at reasoning, weak on artistic judgment, and incapable of doing UI design.

In this brilliantly readable book, author Joel Spolsky proposes simple, logical rules that can be applied without any artistic talent to improve any user interface, from traditional GUI applications to websites to consumer electronics. Spolsky's primary axiom, the importance of bringing the program model in line with the user model, is both rational and simple.

In a fun and entertaining way, Spolky makesuser interfacedesign easy for programmers to grasp. After reading "User Interface Design for Programmers," you'll know how to design interfaces with the user in mind. You'll learn the important principles that underlie all good UI design, and you'll learn how to perform usability testing that works.

Topics in Cryptology -- CT-RSA 2006 - The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February... Topics in Cryptology -- CT-RSA 2006 - The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings (Paperback, 2006 ed.)
David Pointcheval
R1,614 Discovery Miles 16 140 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006. The book presents 24 papers organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R916 R710 Discovery Miles 7 100 Save R206 (22%) Ships in 12 - 17 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

Financial Cryptography and Data Security - 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica,... Financial Cryptography and Data Security - 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers (Paperback, 2005 ed.)
Andrew S. Patrick, Moti Yung
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005. This conference, organized by the International Financial Cryptography Association (IFCA), continues to be the premier international forum for research, exploration, and debate regarding security in the context of finance and commerce. The conference title and scope was expanded this year to cover all aspects of securing transactions and systems. The goal is to build an interdisciplinary meeting, bringing together cryptographers, data-security specialists, business and economy researchers, as well as economists, IT professionals, implementers, and policy makers. We think that this goal was met this year. The conference received 90 submissions and 24 papers were accepted, 22 in the Research track and 2 in the Systems and Applications track. In addition, the conference featured two distinguished invited speakers, Bezalel Gavish and Lynne Coventry, and two interesting panel sessions, one on phishing and the other on economics and information security. Also, for the first time, some of the papers that were judged to be very strong but did not make the final program were selected for special invitation to our Works in Progress (Rump) Session that took place on Wednesday evening. Three papers were highlighted in this forum this year, and short versions of the papers are included here. As always, other conference attendees were also invited to make presentations during the rump session, and the evening lived up to its colorful reputation.

Theory and Applications of Satisfiability Testing - 7th International Conference, SAT 2004, Vancouver, BC, Canada, May 10-13,... Theory and Applications of Satisfiability Testing - 7th International Conference, SAT 2004, Vancouver, BC, Canada, May 10-13, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Holger H. Hoos, David G. Mitchell
R1,630 Discovery Miles 16 300 Ships in 10 - 15 working days

The 7th International Conference on Theory and Applications of Satis?ab- ity Testing (SAT 2004) was held 10-13 May 2004 in Vancouver, BC, Canada. The conference featured 9 technical paper sessions, 2 poster sessions, as well as the 2004 SAT Solver Competition and the 2004 QBF Solver Evaluation. It also included invited talks by Stephen A. Cook (University of Toronto) and Kenneth McMillan (Cadence Berkeley Labs). The 89 participants represented no less than 17 countries and four continents. SAT 2004 continued the series of meetings which started with the Workshops on Satis?ability held in Siena, Italy (1996), Paderborn, Germany (1998) and Renesse, The Netherlands (2000); the Workshop on Theory and Applications of Satis?ability Testing held in Boston, USA(2001);theSymposiumonTheoryandApplicationsofSatis?abilityTesting held in Cincinnati, USA (2002); and the 6th International Conference on Theory and Applications of Satis?ability Testing held in Santa Margherita Ligure, Italy (2003). The International Conference on Theory and Applications of Satis?ability Testing is the primary annual meeting for researchers studying the propo- tional satis?ability problem (SAT), a prominent problem in both theoretical and applied computer science. SAT lies at the heart of the most important open problem in complexity theory (P vsNP) and underlies many applications in, among other examples, arti?cial intelligence, operations research and electronic design engineering. The primary objective of the conferences is to bring together researchersfromvariousareasandcommunities, includingtheoreticalandexp- imental computer science as well as many relevant application areas, to promote collaboration and the communication of new theoretical and practical results in SAT-related research and its industrial applications

From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing): Oliver Kiddle, Peter... From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing)
Oliver Kiddle, Peter Stephenson, Jerry Peek
R1,690 R1,340 Discovery Miles 13 400 Save R350 (21%) Ships in 10 - 15 working days

* In-depth, unique coverage of ZSH, one of most modern and powerful of all shells. Also covers Bash, the preferred shell for most serious Linux and Unix users. * Very strong author and tech review team: Co-author Peter Stephenson has been involved in the development of Zsh since the 1990s when he started to write the FAQ. For the last few years, he has served as coordinator of the shell's development. Tech Reviewers: Ed Schaefer is the "Shell Corner" columnist for SysAdmin Magazine and Bart Schaefer is one of the lead developers of Zsh development. * Book is immediately useful, packed with short example and suggestions that the reader can put to use in their shell environment. * Extensive coverage of interactive and advanced shell features, including shell extensions, completion functions, and shortcuts. * Great book for users of all expertise; perennial seller.

Detection of Intrusions and Malware, and Vulnerability Assessment - Second International Conference, DIMVA 2005, Vienna,... Detection of Intrusions and Malware, and Vulnerability Assessment - Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Paperback, 2005 ed.)
Klaus Julisch, Christopher Kruegel
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) as an annual conference that brings together experts from throughout the world to discuss the state of the art in the areas of intrusion detection, detection of malware, and assessment of vulnerabilities. TheDIMVA2005ProgramCommitteereceived51submissionsfrom18co- tries. This represents an increase of approximately 25% compared with the n- ber of submissions last year. All submissions were carefully reviewed by at least three Program Committee members or external experts according to the cri- ria of scienti?c novelty, importance to the ?eld, and technical quality. The ?nal selection took place at a meeting held on March 18, 2005, in Zurich, Switz- land. Fourteen full papers were selected for presentation and publication in the conference proceedings. In addition, three papers were selected for presentation in the industry track of the conference. The program featured both theoretical and practical research results, which were grouped into six sessions. Philip Att?eld from the Northwest Security Institute gave the opening keynote speech. The slides presented by the authors are available on the DIMVA 2005 Web site at http: //www.dimva.org/dimva2005 We sincerely thank all those who submitted papers as well as the Program Committee members and the external reviewers for their valuable contributions.

Information Security and Privacy - 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings... Information Security and Privacy - 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings (Paperback, 2005 ed.)
Colin Boyd, Juan M. Gonzalez Nieto
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

The 2005 Australasian Conference on Information Security and Privacy was the tenth in the annual series that started in 1996.Over the yearsACISP has grown from a relativelysmallconferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2005 was held at Queensland University of Technology in Brisbane, d- ing July 4-6, 2005. This year there were 185 paper submissions and from these 45 papers were accepted. Accepted papers came from 13 countries, with the largest proportions coming from Australia (12), China (8) and Japan (6). India and Korea both contributed 2 papers and one came from Singapore. There were also 11 papers from European countries and 3 from North America. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2005. The contributed papers were supplemented by four invited talks from e- nent researchers in information security. The father-and-son team of Prof. and Dr. Bob Blakley (Texas A&M University and IBM) gave a talk entitled "All Sail, No Anchor III," following up on a theme started at their ACISP 2000 - vited talk. Adrian McCullagh (Phillips Fox Lawyers and QUT) talked on the bene?t and perils of Internet banking. Ted Dunstone (Biometix) enlightened us on multimodal biometric systems. Yvo Desmedt (University College London) elucidated the growing gap between theory and practice in information security.

Quality of Service - IWQoS 2005 - 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedings... Quality of Service - IWQoS 2005 - 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedings (Paperback, 2005 ed.)
Hermann De Meer, Nina Bhatti
R1,505 Discovery Miles 15 050 Ships in 10 - 15 working days

We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany. We hope that all attendees enjoyed their time in that ancient and historic city. Quality of Service(QoS) continues to be an important area of research. T- ditionally very focused on the area of networking, it has grown to include mobile applications, wireless environments, 3G and 4G cellular networks, user expe- ence, overlay networks, large-scale systemsand other important areas ofappli- tion. Six full-paper sessions that comprised selected papers of very high quality were devoted to the above mentioned, cutting-edge topics in this volume. We had a fascinating cross-disciplinary program and hope to have seeded conn- tions between di?erent disciplines and between industry and academia. In addition to the reviewed paper sessions, we were pleased to present two inspiring keynote speakers in this year's program: Randy Katz, Universityof California, Berkeley, USA, and Michael Stal, SiemensAG, Munich, Germany. One speaker being from academia and one from industry, re?ected well the balanced view of this workshop. Both keynotes extended the scope of QoS and addressed pressing issues, such as "spam," and leading trends, such as "service orientation," and their relevance to QoS.

Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT,... Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Paperback, 2005 ed.)
Sushil Jajodia, Duminda Wijesekera
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to discuss in depth the current state of the researchand practice in data and - plicationsecurity, enableparticipantstobene?tfrompersonalcontactwithother researchers and expand their knowledge, support the activities of the Working Group, and disseminate the research results. This volume contains the 24 papers that were presented at the working c- ference. These papers, which had been selected from 54 submissions, were rig- ously reviewed by the Working Group members. The volume is o?ered both to document progressand to provideresearcherswith a broadperspective of recent developments in data and application security. A special note of thanks goes to the many volunteers whose e?orts made the working conference a success. We wish to thank Divesh Srivastava for agreeing to deliver the invited talk, Carl Landwehr and David Spooner for organizing the panel, the authors for their worthy contributions, and the referees for their time and e?ort in reviewing the papers. We are grateful to T. C. Ting for serving as the General Chair, Steven Demurjian and Charles E. Phillips, Jr. for their hard work as Local Arrangements Chairs, and Pierangela Samarati, Working Group Chair, for managing the IFIP approval process. We would also like to acknowledge Sabrina De Capitani di Vimercati for managing the conference's Web site.

Distributed Computing in Sensor Systems - First IEEE International Conference, DCOSS 2005, Marina del Rey, CA, USA, June... Distributed Computing in Sensor Systems - First IEEE International Conference, DCOSS 2005, Marina del Rey, CA, USA, June 30-July 1, 2005, Proceedings (Paperback, 2005 ed.)
Viktor K. Prasanna, Sitharama Iyengar, Paul Spirakis, Matt Welsh
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

The book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, DCOSS 2005, held in Marina del Rey, California, USA in June/July 2005.

The 26 revised full papers presented were carefully reviewed and selected from 85 submissions; also included are the abstracts of 3 invited talks, 2 short papers, 9 invited poster abstracts, and 10 contributed abstracts.The papers address all current aspects of distributed computing issues in large-scale networked sensor systems, including systematic design techniques and tools, algorithms, and applications.

Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens,... Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Martin Steffen, Gianluigi Zavattaro
R1,588 Discovery Miles 15 880 Ships in 10 - 15 working days

This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open Object-Based Distributed Systems. The conference was held in Athens, Greece on June 15-17, 2005. The eventwasthe seventhmeeting ofthis conferenceseries, whichis held roughly- eryyearandahalf, withtheearliereventsheldrespectivelyinParis, Canterbury, Florence, Stanford, Twente, and Paris. ThegoaloftheFMOODSseriesofconferencesistobringtogetherresearchers whose work encompasses three important and related ?elds: - formal methods; - distributed systems; - object-based technology. Sucha convergenceis representativeofrecentadvancesin the?eld ofdistributed systems, and provides links between several scienti?c and technological com- nities, as represented by the conferences FORTE, CONCUR, and ECOOP. The objective of FMOODS is to provide an integrated forum for the pres- tation of research in the above-mentioned ?elds, and the exchange of ideas and experiences in the topics concerned with the formal methods support for open object-based distributed systems. For the call for papers, aspects of interest - cluded, but were not limited to: formal models; formal techniques for speci?- tion, design, or analysis; veri?cation, testing, and validation; component-based design; formal aspects of service-oriented computing; semantics and type s- tems for programming, coordination, or modelling languages; behavioraltyping; multiple viewpoint modelling and consistency between di?erent models; tra- formations of models; integration of quality-of-service requirements into formal models; formal models for security; formal approachesto distributed component frameworks;andapplications andexperience, carefullydescribed. Work onthese aspects of (o?cial and de facto) standardnotation and languagesfor serviceo- ented design, e. g. web services orchestration languages, was explicitly welc

Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005,... Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005, Proceedings (Paperback, 2005 ed.)
Gianfranco Ciardo, Philippe Darondeau
R1,677 Discovery Miles 16 770 Ships in 10 - 15 working days

This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005). The Petri net conferences serve to discuss yearly progress in the ?eld of Petri nets and related models of concurrency, and to foster new - vancesintheapplicationandtheoryofPetrinets.Theconferencestypicallyhave 100-150 participants, one third from industry and the others from universities and research institutions, and they always take place in the last week of June. SuccessiveeditionsoftheconferencearecoordinatedbytheSteeringCommittee, whose members are listed on the next page, which also supervises several other activities-see the Petri Nets World at the URLwww.daimi.au.dk/PetriNets. The 2005 conference was organized in Miami by the School of Computer Science at Florida International University (USA). We would like to express our deep thanks to the Organizing Committee, chaired by Xudong He, for the time and e?ort invested to the bene't of the community in making the event successful. Several tutorials and workshops were organized within the conf- ence, covering introductory and advanced aspects related to Petri nets. Detailed information can be found at the conference URLwww.cs.fiu.edu/atpn2005. We received altogether 71 submissions from authors in 22 countries. Two submissions were not in the scope of the conference. The Program Comm- tee selected 23 contributions from the remaining 69 submissions, classi?ed into three categories: application papers (6 accepted, 25 submitted), theory papers (14 accepted, 40 submitted), and tool presentations (3 accepted, 4 submitted).

Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June... Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Lea Kutvonen
R1,535 Discovery Miles 15 350 Ships in 10 - 15 working days

ThisvolumecontainstheproceedingsoftheIFIPWG6. 1InternationalWorking Conference on Distributed Applications and Interoperable Systems V held in Athens, Greece, on June 15-17, 2005. The conference program presented the state of the art in research concerning distributed and interoperable systems. The emergence of 4th-generation c- munication systems, the evolution of Internet technologies, the convergence of telecom and datacom, wireless and ?xed communication systems and appli- tions pave the path for ubiquitous service and application provision. Innovative solutions are required for the development, implementation and operation of distributed applications in complex IT environments full of diversity and h- erogeneity. Today, the emerging wide spectrum of distributed systems - ranging from ambient intelligence to global computing scenarios - lacks systematic - plication development support. Following the evolution of the ?eld, DAIS 2005 focuses on models, technologies and platforms for interoperable, scalable and adaptable distributed applications within all kinds of computing environments. The papers presented at DAIS 2005 cover methodological aspects of building and architecting distributed and interoperable services, interoperability te- nologies, context- and location-based applications, con?gurability of commu- cation services, performance issues, data-integration issues, and Web services. In comparison to earlier events, the submissions showed increased interest towards methodological aspects and large-scale system interoperability. These proceedings contain 16 regular and 5 short papers, which were - lected in a careful, international reviewing process.

Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.): Sven A. Brueckner, Giovanna Di... Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.)
Sven A. Brueckner, Giovanna Di Marzo Serugendo, Anthony Karageorgos, Radhika Nagpal
R1,474 Discovery Miles 14 740 Ships in 10 - 15 working days

Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexity of distributed interacting software and information handling systems. Self-organising applications are able to dynamically change their functionality and structure without direct user intervention to respond to changes in requirements and the environment.

This book comprises revised and extended papers presented at the International Workshop on Engineering Self-Organising Applications, ESOA 2004, held in New York, NY, USA in July 2004 at AAMAS as well as invited papers from leading researchers. The papers are organized in topical sections on state of the art, synthesis and design methods, self-assembly and robots, stigmergy and related topics, and industrial applications.

Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback,... Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback, 2005 ed.)
Hans W. Gellersen, Roy Want, Albrecht Schmidt
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

WelcometotheproceedingsofPervasive2005, The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- puting. The conference is attracting research submissions of very high quality from all over the world, and from researchers representing a variety of disciplines and perspectives. We thank everybody who submitted their papers to Pervasive, demonstrating the extensive work going on in this area; and the Program C- mittee and our external reviewers who spent countless hours providing feedback and guidance in order to create the ?nal program. This year we received 130 submissions. By the end of the review process, we had 566 reviews on ?le, as well as long email discussion threads for each paper. In an initial phase we had each paper reviewed by two members of the Program Committee and two external reviewers. In a second phase, each paper wasdiscussedbyitsfourreviewerstoreachconsensusastoitstechnicalmerit. At the end of this phase, the top-rated papers as well as those that were found to be most controversial were selected for discussion at the PC meeting and reviewed by an additional PC member. The result being that each paper discussed in the PC meeting had 5 reviews and was read by three people who participated in the meeting, leading to a very informed and lively discussion

Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.): Nathan Good Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.)
Nathan Good
R1,022 R848 Discovery Miles 8 480 Save R174 (17%) Ships in 10 - 15 working days

Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter "Regular Expression Recipes for Windows Developers." This is the only book of its kind that presents material in a functional, concise manner. It contains over 100 of the most popular regular expressions, along with explanations of how to use each one. It also covers all of the major development languages, including JavaScript, VB, VB .NET, and C#.

Author -->Nathan A. Good -->teaches by example and provides concise syntax references as necessary throughout the book. You're sure to find his examples accurate and relevant. This book is an ideal solutions guide for you to keep in a handy place for quick reference.-->Table of Contents-->Words and Text URLs and Paths CSV and Tab-Delimited Files Formatting and Validating HTML and XML Source Code

Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005,... Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Paperback, 2005 ed.)
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission, reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference

Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback,... Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback, 2005 ed.)
Heinrich Rust
R1,529 Discovery Miles 15 290 Ships in 10 - 15 working days

This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a dense real-number time model. The proposed time model is well suited to express synchronicity of events in a real-number time model as well as strict causality by using uniform discrete time steps. Thus it integrates and reconciles two views of time that are commonly used separately in di?erent application domains. In many discrete systems time is modelled by discrete steps of uniform length, in continuous systems time is seen as a dense ?ow. Themainideatointegratethesedi?erentviewsisadiscretizationofthedense real-number time structure by using constant in?nitesimal time steps within each real-number point in time. The underlying mathematical structure of this time model is based on concepts of Non-standard Analysis as proposed by Abraham Robinson in the 1950s. The discrete modelling, i.e., the descr- tion of sequential discrete algorithms at di?erent abstraction levels, is done with Abstract State Machines along the formalisms developed by Yuri Gu- vich and temporal logic. These ingredients produce a rich formal basis for describing a large variety of systems with quantitative linear time prop- ties, by seamless integration, re?nement and embedding of continuous and discrete models into one uniform semantic framework called Non-standard Timed Abstract State Machines (NTASM)."

Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings... Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Paperback, 2005 ed.)
Dieter Hutter, Markus Ullmann
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services, adhocnetworking, resourceallocation/restriction, invisibility, andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ] of ] fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BS

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
UC/OS-III - The Real-Time Kernel and the…
Jean J. Labrosse Hardcover R1,773 Discovery Miles 17 730
Robot Operating System (ROS) - The…
Anis Koubaa Hardcover R4,907 Discovery Miles 49 070
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
Frameworks for Developing Efficient…
John Krogstie Hardcover R5,153 Discovery Miles 51 530
VLSI-SoC: New Technology Enabler - 27th…
Carolina Metzler, Pierre-Emmanuel Gaillardon, … Hardcover R1,520 Discovery Miles 15 200
Robot Operating System (ROS) - The…
Anis Koubaa Hardcover R4,602 Discovery Miles 46 020
Web-Based Supply Chain Management and…
R. Manjunath Hardcover R4,749 Discovery Miles 47 490
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,252 Discovery Miles 12 520
5G Wireless Systems - Simulation and…
Yang Yang, Jing Xu, … Hardcover R4,586 Discovery Miles 45 860
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760

 

Partners