0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (18)
  • R250 - R500 (78)
  • R500+ (1,114)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Construction and Analysis of Safe, Secure, and Interoperable Smart Devices - Second International Workshop, CASSIS 2005, Nice,... Construction and Analysis of Safe, Secure, and Interoperable Smart Devices - Second International Workshop, CASSIS 2005, Nice, France, March 8-11, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Gilles Barthe, Benjamin Gregoire, Marieke Huisman, Jean-Luis Lanet
R1,554 Discovery Miles 15 540 Ships in 10 - 15 working days

This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2005. The 9 revised full papers presented were carefully selected during two rounds of reviewing and improvement from about 30 workshop talks. The papers are organized in topical sections on research trends in smart devices, Web services, virtual machine technology, security, validation and formal methods, proof-carrying code, and embedded devices.

Engineering Self-Organising Systems - Third International Workshop, ESOA 2005, Utrecht, The Netherlands, July 25, 2005, Revised... Engineering Self-Organising Systems - Third International Workshop, ESOA 2005, Utrecht, The Netherlands, July 25, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Sven A. Brueckner, Giovanni Di Marzo Serugendo, David Hales
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

This book constitutes the refereed post-proceedings of the Third International Workshop on Engineering Self-Organising Applications, ESOA 2005, held in July 2005 as an associated event of AAMAS 2005. The 12 revised full papers and 6 revised short papers presented are organized in topical sections on novel self-organising mechanisms, methodologies, models and tools for self-organising applications, and specific applications of self-organising mechanisms.

Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised... Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers (Paperback, 2006 ed.)
Alfonso Valdes, Diego Zamboni
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection held in September 2005. The 15 revised full papers and two practical experience reports were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on worm detection and containment, anomaly detection, intrusion prevention and response, intrusion detection based on system calls and network-based, as well as intrusion detection in mobile and wireless networks.

Compiler Construction - 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and... Compiler Construction - 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 30-31, 2006, Proceedings (Paperback, 2006 ed.)
Alan Mycroft, Andreas Zeller
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Compiler Construction, CC 2006, held in March 2006 as part of ETAPS. The 17 revised full papers presented together with three tool demonstration papers and one invited paper were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections.

Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005,... Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days


This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.

The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

User Interface Design for Programmers (Paperback, Softcover reprint of the original 1st ed.): Avram Joel Spolsky User Interface Design for Programmers (Paperback, Softcover reprint of the original 1st ed.)
Avram Joel Spolsky
R1,514 R1,239 Discovery Miles 12 390 Save R275 (18%) Ships in 10 - 15 working days

Most programmers' fear of user interface (UI) programming comes from their fear of doing UI design. They think that UI design is like graphic designthe mysterious process by which creative, latte-drinking, all-black-wearing people produce cool-looking, artistic pieces. Most programmers see themselves as analytic, logical thinkers insteadstrong at reasoning, weak on artistic judgment, and incapable of doing UI design.

In this brilliantly readable book, author Joel Spolsky proposes simple, logical rules that can be applied without any artistic talent to improve any user interface, from traditional GUI applications to websites to consumer electronics. Spolsky's primary axiom, the importance of bringing the program model in line with the user model, is both rational and simple.

In a fun and entertaining way, Spolky makesuser interfacedesign easy for programmers to grasp. After reading "User Interface Design for Programmers," you'll know how to design interfaces with the user in mind. You'll learn the important principles that underlie all good UI design, and you'll learn how to perform usability testing that works.

Architecture of Computing Systems - ARCS 2006 - 19th International Conference, Frankfurt/Main, Germany, March 13-16, 2006,... Architecture of Computing Systems - ARCS 2006 - 19th International Conference, Frankfurt/Main, Germany, March 13-16, 2006, Proceedings (Paperback, 2006 ed.)
Werner Grass, Bernhard Sick, Klaus Waldschmidt
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Architecture of Computing Systems, ARCS 2006, held in March 2006. The 32 revised full papers presented together with two invited and keynote papers were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on pervasive computing, memory systems, architectures, multiprocessing, energy efficient design, power awareness, network protocols, security, and distributed networks.

Topics in Cryptology -- CT-RSA 2006 - The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February... Topics in Cryptology -- CT-RSA 2006 - The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings (Paperback, 2006 ed.)
David Pointcheval
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006. The book presents 24 papers organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.

Distributed Computing in Sensor Systems - Second IEEE International Conference, DCOSS 2006, San Francisco, CA, USA, June 18-20,... Distributed Computing in Sensor Systems - Second IEEE International Conference, DCOSS 2006, San Francisco, CA, USA, June 18-20, 2006, Proceedings (Paperback, 2006 ed.)
Phil Gibbons, Tarek Abdelzaher, James Aspnes, Ramesh Rao
R1,786 Discovery Miles 17 860 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA, June 2006. The book presents 33 revised full papers, focusing on distributed computing issues in large-scale networked sensor systems. Coverage includes topics such as distributed algorithms and applications, programming support and middleware, data aggregation and dissemination, security, information fusion, lifetime maximization, and localization.

Theory and Applications of Satisfiability Testing - 7th International Conference, SAT 2004, Vancouver, BC, Canada, May 10-13,... Theory and Applications of Satisfiability Testing - 7th International Conference, SAT 2004, Vancouver, BC, Canada, May 10-13, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Holger H. Hoos, David G. Mitchell
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

The 7th International Conference on Theory and Applications of Satis?ab- ity Testing (SAT 2004) was held 10-13 May 2004 in Vancouver, BC, Canada. The conference featured 9 technical paper sessions, 2 poster sessions, as well as the 2004 SAT Solver Competition and the 2004 QBF Solver Evaluation. It also included invited talks by Stephen A. Cook (University of Toronto) and Kenneth McMillan (Cadence Berkeley Labs). The 89 participants represented no less than 17 countries and four continents. SAT 2004 continued the series of meetings which started with the Workshops on Satis?ability held in Siena, Italy (1996), Paderborn, Germany (1998) and Renesse, The Netherlands (2000); the Workshop on Theory and Applications of Satis?ability Testing held in Boston, USA(2001);theSymposiumonTheoryandApplicationsofSatis?abilityTesting held in Cincinnati, USA (2002); and the 6th International Conference on Theory and Applications of Satis?ability Testing held in Santa Margherita Ligure, Italy (2003). The International Conference on Theory and Applications of Satis?ability Testing is the primary annual meeting for researchers studying the propo- tional satis?ability problem (SAT), a prominent problem in both theoretical and applied computer science. SAT lies at the heart of the most important open problem in complexity theory (P vsNP) and underlies many applications in, among other examples, arti?cial intelligence, operations research and electronic design engineering. The primary objective of the conferences is to bring together researchersfromvariousareasandcommunities, includingtheoreticalandexp- imental computer science as well as many relevant application areas, to promote collaboration and the communication of new theoretical and practical results in SAT-related research and its industrial applications

Detection of Intrusions and Malware, and Vulnerability Assessment - Second International Conference, DIMVA 2005, Vienna,... Detection of Intrusions and Malware, and Vulnerability Assessment - Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings (Paperback, 2005 ed.)
Klaus Julisch, Christopher Kruegel
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA). DIMVA is organized by the Special Interest Group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) as an annual conference that brings together experts from throughout the world to discuss the state of the art in the areas of intrusion detection, detection of malware, and assessment of vulnerabilities. TheDIMVA2005ProgramCommitteereceived51submissionsfrom18co- tries. This represents an increase of approximately 25% compared with the n- ber of submissions last year. All submissions were carefully reviewed by at least three Program Committee members or external experts according to the cri- ria of scienti?c novelty, importance to the ?eld, and technical quality. The ?nal selection took place at a meeting held on March 18, 2005, in Zurich, Switz- land. Fourteen full papers were selected for presentation and publication in the conference proceedings. In addition, three papers were selected for presentation in the industry track of the conference. The program featured both theoretical and practical research results, which were grouped into six sessions. Philip Att?eld from the Northwest Security Institute gave the opening keynote speech. The slides presented by the authors are available on the DIMVA 2005 Web site at http: //www.dimva.org/dimva2005 We sincerely thank all those who submitted papers as well as the Program Committee members and the external reviewers for their valuable contributions.

Quality of Service - IWQoS 2005 - 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedings... Quality of Service - IWQoS 2005 - 13th International Workshop, IWQoS 2005, Passau, Germany, June 21-23, 2005. Proceedings (Paperback, 2005 ed.)
Hermann De Meer, Nina Bhatti
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany. We hope that all attendees enjoyed their time in that ancient and historic city. Quality of Service(QoS) continues to be an important area of research. T- ditionally very focused on the area of networking, it has grown to include mobile applications, wireless environments, 3G and 4G cellular networks, user expe- ence, overlay networks, large-scale systemsand other important areas ofappli- tion. Six full-paper sessions that comprised selected papers of very high quality were devoted to the above mentioned, cutting-edge topics in this volume. We had a fascinating cross-disciplinary program and hope to have seeded conn- tions between di?erent disciplines and between industry and academia. In addition to the reviewed paper sessions, we were pleased to present two inspiring keynote speakers in this year's program: Randy Katz, Universityof California, Berkeley, USA, and Michael Stal, SiemensAG, Munich, Germany. One speaker being from academia and one from industry, re?ected well the balanced view of this workshop. Both keynotes extended the scope of QoS and addressed pressing issues, such as "spam," and leading trends, such as "service orientation," and their relevance to QoS.

Information Security and Privacy - 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings... Information Security and Privacy - 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings (Paperback, 2005 ed.)
Colin Boyd, Juan M. Gonzalez Nieto
R1,798 Discovery Miles 17 980 Ships in 10 - 15 working days

The 2005 Australasian Conference on Information Security and Privacy was the tenth in the annual series that started in 1996.Over the yearsACISP has grown from a relativelysmallconferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2005 was held at Queensland University of Technology in Brisbane, d- ing July 4-6, 2005. This year there were 185 paper submissions and from these 45 papers were accepted. Accepted papers came from 13 countries, with the largest proportions coming from Australia (12), China (8) and Japan (6). India and Korea both contributed 2 papers and one came from Singapore. There were also 11 papers from European countries and 3 from North America. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2005. The contributed papers were supplemented by four invited talks from e- nent researchers in information security. The father-and-son team of Prof. and Dr. Bob Blakley (Texas A&M University and IBM) gave a talk entitled "All Sail, No Anchor III," following up on a theme started at their ACISP 2000 - vited talk. Adrian McCullagh (Phillips Fox Lawyers and QUT) talked on the bene?t and perils of Internet banking. Ted Dunstone (Biometix) enlightened us on multimodal biometric systems. Yvo Desmedt (University College London) elucidated the growing gap between theory and practice in information security.

Distributed Computing in Sensor Systems - First IEEE International Conference, DCOSS 2005, Marina del Rey, CA, USA, June... Distributed Computing in Sensor Systems - First IEEE International Conference, DCOSS 2005, Marina del Rey, CA, USA, June 30-July 1, 2005, Proceedings (Paperback, 2005 ed.)
Viktor K. Prasanna, Sitharama Iyengar, Paul Spirakis, Matt Welsh
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

The book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, DCOSS 2005, held in Marina del Rey, California, USA in June/July 2005.

The 26 revised full papers presented were carefully reviewed and selected from 85 submissions; also included are the abstracts of 3 invited talks, 2 short papers, 9 invited poster abstracts, and 10 contributed abstracts.The papers address all current aspects of distributed computing issues in large-scale networked sensor systems, including systematic design techniques and tools, algorithms, and applications.

Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens,... Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Martin Steffen, Gianluigi Zavattaro
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open Object-Based Distributed Systems. The conference was held in Athens, Greece on June 15-17, 2005. The eventwasthe seventhmeeting ofthis conferenceseries, whichis held roughly- eryyearandahalf, withtheearliereventsheldrespectivelyinParis, Canterbury, Florence, Stanford, Twente, and Paris. ThegoaloftheFMOODSseriesofconferencesistobringtogetherresearchers whose work encompasses three important and related ?elds: - formal methods; - distributed systems; - object-based technology. Sucha convergenceis representativeofrecentadvancesin the?eld ofdistributed systems, and provides links between several scienti?c and technological com- nities, as represented by the conferences FORTE, CONCUR, and ECOOP. The objective of FMOODS is to provide an integrated forum for the pres- tation of research in the above-mentioned ?elds, and the exchange of ideas and experiences in the topics concerned with the formal methods support for open object-based distributed systems. For the call for papers, aspects of interest - cluded, but were not limited to: formal models; formal techniques for speci?- tion, design, or analysis; veri?cation, testing, and validation; component-based design; formal aspects of service-oriented computing; semantics and type s- tems for programming, coordination, or modelling languages; behavioraltyping; multiple viewpoint modelling and consistency between di?erent models; tra- formations of models; integration of quality-of-service requirements into formal models; formal models for security; formal approachesto distributed component frameworks;andapplications andexperience, carefullydescribed. Work onthese aspects of (o?cial and de facto) standardnotation and languagesfor serviceo- ented design, e. g. web services orchestration languages, was explicitly welc

Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT,... Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Paperback, 2005 ed.)
Sushil Jajodia, Duminda Wijesekera
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to discuss in depth the current state of the researchand practice in data and - plicationsecurity, enableparticipantstobene?tfrompersonalcontactwithother researchers and expand their knowledge, support the activities of the Working Group, and disseminate the research results. This volume contains the 24 papers that were presented at the working c- ference. These papers, which had been selected from 54 submissions, were rig- ously reviewed by the Working Group members. The volume is o?ered both to document progressand to provideresearcherswith a broadperspective of recent developments in data and application security. A special note of thanks goes to the many volunteers whose e?orts made the working conference a success. We wish to thank Divesh Srivastava for agreeing to deliver the invited talk, Carl Landwehr and David Spooner for organizing the panel, the authors for their worthy contributions, and the referees for their time and e?ort in reviewing the papers. We are grateful to T. C. Ting for serving as the General Chair, Steven Demurjian and Charles E. Phillips, Jr. for their hard work as Local Arrangements Chairs, and Pierangela Samarati, Working Group Chair, for managing the IFIP approval process. We would also like to acknowledge Sabrina De Capitani di Vimercati for managing the conference's Web site.

Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006,... Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006 ed.)
Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.

Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005,... Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005, Proceedings (Paperback, 2005 ed.)
Gianfranco Ciardo, Philippe Darondeau
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005). The Petri net conferences serve to discuss yearly progress in the ?eld of Petri nets and related models of concurrency, and to foster new - vancesintheapplicationandtheoryofPetrinets.Theconferencestypicallyhave 100-150 participants, one third from industry and the others from universities and research institutions, and they always take place in the last week of June. SuccessiveeditionsoftheconferencearecoordinatedbytheSteeringCommittee, whose members are listed on the next page, which also supervises several other activities-see the Petri Nets World at the URLwww.daimi.au.dk/PetriNets. The 2005 conference was organized in Miami by the School of Computer Science at Florida International University (USA). We would like to express our deep thanks to the Organizing Committee, chaired by Xudong He, for the time and e?ort invested to the bene't of the community in making the event successful. Several tutorials and workshops were organized within the conf- ence, covering introductory and advanced aspects related to Petri nets. Detailed information can be found at the conference URLwww.cs.fiu.edu/atpn2005. We received altogether 71 submissions from authors in 22 countries. Two submissions were not in the scope of the conference. The Program Comm- tee selected 23 contributions from the remaining 69 submissions, classi?ed into three categories: application papers (6 accepted, 25 submitted), theory papers (14 accepted, 40 submitted), and tool presentations (3 accepted, 4 submitted).

Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.): Nathan Good Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.)
Nathan Good
R1,022 R884 Discovery Miles 8 840 Save R138 (14%) Ships in 10 - 15 working days

Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter "Regular Expression Recipes for Windows Developers." This is the only book of its kind that presents material in a functional, concise manner. It contains over 100 of the most popular regular expressions, along with explanations of how to use each one. It also covers all of the major development languages, including JavaScript, VB, VB .NET, and C#.

Author -->Nathan A. Good -->teaches by example and provides concise syntax references as necessary throughout the book. You're sure to find his examples accurate and relevant. This book is an ideal solutions guide for you to keep in a handy place for quick reference.-->Table of Contents-->Words and Text URLs and Paths CSV and Tab-Delimited Files Formatting and Validating HTML and XML Source Code

Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June... Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Lea Kutvonen
R1,587 Discovery Miles 15 870 Ships in 10 - 15 working days

ThisvolumecontainstheproceedingsoftheIFIPWG6. 1InternationalWorking Conference on Distributed Applications and Interoperable Systems V held in Athens, Greece, on June 15-17, 2005. The conference program presented the state of the art in research concerning distributed and interoperable systems. The emergence of 4th-generation c- munication systems, the evolution of Internet technologies, the convergence of telecom and datacom, wireless and ?xed communication systems and appli- tions pave the path for ubiquitous service and application provision. Innovative solutions are required for the development, implementation and operation of distributed applications in complex IT environments full of diversity and h- erogeneity. Today, the emerging wide spectrum of distributed systems - ranging from ambient intelligence to global computing scenarios - lacks systematic - plication development support. Following the evolution of the ?eld, DAIS 2005 focuses on models, technologies and platforms for interoperable, scalable and adaptable distributed applications within all kinds of computing environments. The papers presented at DAIS 2005 cover methodological aspects of building and architecting distributed and interoperable services, interoperability te- nologies, context- and location-based applications, con?gurability of commu- cation services, performance issues, data-integration issues, and Web services. In comparison to earlier events, the submissions showed increased interest towards methodological aspects and large-scale system interoperability. These proceedings contain 16 regular and 5 short papers, which were - lected in a careful, international reviewing process.

Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.): Sven A. Brueckner, Giovanna Di... Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.)
Sven A. Brueckner, Giovanna Di Marzo Serugendo, Anthony Karageorgos, Radhika Nagpal
R1,527 Discovery Miles 15 270 Ships in 10 - 15 working days

Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexity of distributed interacting software and information handling systems. Self-organising applications are able to dynamically change their functionality and structure without direct user intervention to respond to changes in requirements and the environment.

This book comprises revised and extended papers presented at the International Workshop on Engineering Self-Organising Applications, ESOA 2004, held in New York, NY, USA in July 2004 at AAMAS as well as invited papers from leading researchers. The papers are organized in topical sections on state of the art, synthesis and design methods, self-assembly and robots, stigmergy and related topics, and industrial applications.

Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback,... Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback, 2005 ed.)
Heinrich Rust
R1,581 Discovery Miles 15 810 Ships in 10 - 15 working days

This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a dense real-number time model. The proposed time model is well suited to express synchronicity of events in a real-number time model as well as strict causality by using uniform discrete time steps. Thus it integrates and reconciles two views of time that are commonly used separately in di?erent application domains. In many discrete systems time is modelled by discrete steps of uniform length, in continuous systems time is seen as a dense ?ow. Themainideatointegratethesedi?erentviewsisadiscretizationofthedense real-number time structure by using constant in?nitesimal time steps within each real-number point in time. The underlying mathematical structure of this time model is based on concepts of Non-standard Analysis as proposed by Abraham Robinson in the 1950s. The discrete modelling, i.e., the descr- tion of sequential discrete algorithms at di?erent abstraction levels, is done with Abstract State Machines along the formalisms developed by Yuri Gu- vich and temporal logic. These ingredients produce a rich formal basis for describing a large variety of systems with quantitative linear time prop- ties, by seamless integration, re?nement and embedding of continuous and discrete models into one uniform semantic framework called Non-standard Timed Abstract State Machines (NTASM)."

Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings... Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings (Paperback, 2005 ed.)
Henry S. Baird, Daniel P. Lopresti
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.

Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback,... Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback, 2005 ed.)
Hans W. Gellersen, Roy Want, Albrecht Schmidt
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

WelcometotheproceedingsofPervasive2005, The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- puting. The conference is attracting research submissions of very high quality from all over the world, and from researchers representing a variety of disciplines and perspectives. We thank everybody who submitted their papers to Pervasive, demonstrating the extensive work going on in this area; and the Program C- mittee and our external reviewers who spent countless hours providing feedback and guidance in order to create the ?nal program. This year we received 130 submissions. By the end of the review process, we had 566 reviews on ?le, as well as long email discussion threads for each paper. In an initial phase we had each paper reviewed by two members of the Program Committee and two external reviewers. In a second phase, each paper wasdiscussedbyitsfourreviewerstoreachconsensusastoitstechnicalmerit. At the end of this phase, the top-rated papers as well as those that were found to be most controversial were selected for discussion at the PC meeting and reviewed by an additional PC member. The result being that each paper discussed in the PC meeting had 5 reviews and was read by three people who participated in the meeting, leading to a very informed and lively discussion

Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005,... Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings (Paperback, 2005 ed.)
Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rethinking Regulation of International…
Uzma Ashraf Barton Hardcover R4,961 Discovery Miles 49 610
EURO Working Group on DSS - A Tour of…
Jason Papathanasiou, Pascale Zarate, … Hardcover R2,941 Discovery Miles 29 410
Scheduling with Time-Changing Effects…
Vitaly A. Strusevich, Kabir Rustogi Hardcover R4,394 R3,824 Discovery Miles 38 240
Start-up Law
Alexandra Andhov Paperback R2,424 Discovery Miles 24 240
Code of Federal Regulations, Title 31…
Office of the Federal Register (U S ) Paperback R1,216 Discovery Miles 12 160
Strategies for Minimizing Risk Under the…
Mike Koehler Paperback R2,217 Discovery Miles 22 170
29th European Symposium on Computer…
Anton A Kiss, Edwin Zondervan, … Hardcover R12,034 Discovery Miles 120 340
Representations for Genetic and…
Franz Rothlauf Hardcover R4,393 Discovery Miles 43 930
Beyond Shareholder Value - A Framework…
P.M. Vasudev Hardcover R4,195 Discovery Miles 41 950
The Rise of Blockchains - Disrupting…
Nir Kshetri Hardcover R2,849 Discovery Miles 28 490

 

Partners