0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (24)
  • R250 - R500 (76)
  • R500+ (1,114)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General

Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005,... Applications and Theory of Petri Nets 2005 - 26th International Conference, ICATPN 2005, Miami, FL, June 20-25, 2005, Proceedings (Paperback, 2005 ed.)
Gianfranco Ciardo, Philippe Darondeau
R1,816 Discovery Miles 18 160 Ships in 10 - 15 working days

This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005). The Petri net conferences serve to discuss yearly progress in the ?eld of Petri nets and related models of concurrency, and to foster new - vancesintheapplicationandtheoryofPetrinets.Theconferencestypicallyhave 100-150 participants, one third from industry and the others from universities and research institutions, and they always take place in the last week of June. SuccessiveeditionsoftheconferencearecoordinatedbytheSteeringCommittee, whose members are listed on the next page, which also supervises several other activities-see the Petri Nets World at the URLwww.daimi.au.dk/PetriNets. The 2005 conference was organized in Miami by the School of Computer Science at Florida International University (USA). We would like to express our deep thanks to the Organizing Committee, chaired by Xudong He, for the time and e?ort invested to the bene't of the community in making the event successful. Several tutorials and workshops were organized within the conf- ence, covering introductory and advanced aspects related to Petri nets. Detailed information can be found at the conference URLwww.cs.fiu.edu/atpn2005. We received altogether 71 submissions from authors in 22 countries. Two submissions were not in the scope of the conference. The Program Comm- tee selected 23 contributions from the remaining 69 submissions, classi?ed into three categories: application papers (6 accepted, 25 submitted), theory papers (14 accepted, 40 submitted), and tool presentations (3 accepted, 4 submitted).

Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens,... Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Martin Steffen, Gianluigi Zavattaro
R1,723 Discovery Miles 17 230 Ships in 10 - 15 working days

This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open Object-Based Distributed Systems. The conference was held in Athens, Greece on June 15-17, 2005. The eventwasthe seventhmeeting ofthis conferenceseries, whichis held roughly- eryyearandahalf, withtheearliereventsheldrespectivelyinParis, Canterbury, Florence, Stanford, Twente, and Paris. ThegoaloftheFMOODSseriesofconferencesistobringtogetherresearchers whose work encompasses three important and related ?elds: - formal methods; - distributed systems; - object-based technology. Sucha convergenceis representativeofrecentadvancesin the?eld ofdistributed systems, and provides links between several scienti?c and technological com- nities, as represented by the conferences FORTE, CONCUR, and ECOOP. The objective of FMOODS is to provide an integrated forum for the pres- tation of research in the above-mentioned ?elds, and the exchange of ideas and experiences in the topics concerned with the formal methods support for open object-based distributed systems. For the call for papers, aspects of interest - cluded, but were not limited to: formal models; formal techniques for speci?- tion, design, or analysis; veri?cation, testing, and validation; component-based design; formal aspects of service-oriented computing; semantics and type s- tems for programming, coordination, or modelling languages; behavioraltyping; multiple viewpoint modelling and consistency between di?erent models; tra- formations of models; integration of quality-of-service requirements into formal models; formal models for security; formal approachesto distributed component frameworks;andapplications andexperience, carefullydescribed. Work onthese aspects of (o?cial and de facto) standardnotation and languagesfor serviceo- ented design, e. g. web services orchestration languages, was explicitly welc

Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June... Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Lea Kutvonen
R1,667 Discovery Miles 16 670 Ships in 10 - 15 working days

ThisvolumecontainstheproceedingsoftheIFIPWG6. 1InternationalWorking Conference on Distributed Applications and Interoperable Systems V held in Athens, Greece, on June 15-17, 2005. The conference program presented the state of the art in research concerning distributed and interoperable systems. The emergence of 4th-generation c- munication systems, the evolution of Internet technologies, the convergence of telecom and datacom, wireless and ?xed communication systems and appli- tions pave the path for ubiquitous service and application provision. Innovative solutions are required for the development, implementation and operation of distributed applications in complex IT environments full of diversity and h- erogeneity. Today, the emerging wide spectrum of distributed systems - ranging from ambient intelligence to global computing scenarios - lacks systematic - plication development support. Following the evolution of the ?eld, DAIS 2005 focuses on models, technologies and platforms for interoperable, scalable and adaptable distributed applications within all kinds of computing environments. The papers presented at DAIS 2005 cover methodological aspects of building and architecting distributed and interoperable services, interoperability te- nologies, context- and location-based applications, con?gurability of commu- cation services, performance issues, data-integration issues, and Web services. In comparison to earlier events, the submissions showed increased interest towards methodological aspects and large-scale system interoperability. These proceedings contain 16 regular and 5 short papers, which were - lected in a careful, international reviewing process.

Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.): Sven A. Brueckner, Giovanna Di... Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.)
Sven A. Brueckner, Giovanna Di Marzo Serugendo, Anthony Karageorgos, Radhika Nagpal
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexity of distributed interacting software and information handling systems. Self-organising applications are able to dynamically change their functionality and structure without direct user intervention to respond to changes in requirements and the environment.

This book comprises revised and extended papers presented at the International Workshop on Engineering Self-Organising Applications, ESOA 2004, held in New York, NY, USA in July 2004 at AAMAS as well as invited papers from leading researchers. The papers are organized in topical sections on state of the art, synthesis and design methods, self-assembly and robots, stigmergy and related topics, and industrial applications.

Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006,... Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006 ed.)
Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
R1,766 Discovery Miles 17 660 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.

Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback,... Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback, 2005 ed.)
Hans W. Gellersen, Roy Want, Albrecht Schmidt
R1,739 Discovery Miles 17 390 Ships in 10 - 15 working days

WelcometotheproceedingsofPervasive2005, The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- puting. The conference is attracting research submissions of very high quality from all over the world, and from researchers representing a variety of disciplines and perspectives. We thank everybody who submitted their papers to Pervasive, demonstrating the extensive work going on in this area; and the Program C- mittee and our external reviewers who spent countless hours providing feedback and guidance in order to create the ?nal program. This year we received 130 submissions. By the end of the review process, we had 566 reviews on ?le, as well as long email discussion threads for each paper. In an initial phase we had each paper reviewed by two members of the Program Committee and two external reviewers. In a second phase, each paper wasdiscussedbyitsfourreviewerstoreachconsensusastoitstechnicalmerit. At the end of this phase, the top-rated papers as well as those that were found to be most controversial were selected for discussion at the PC meeting and reviewed by an additional PC member. The result being that each paper discussed in the PC meeting had 5 reviews and was read by three people who participated in the meeting, leading to a very informed and lively discussion

Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.): Nathan Good Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.)
Nathan Good
R1,076 R926 Discovery Miles 9 260 Save R150 (14%) Ships in 10 - 15 working days

Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter "Regular Expression Recipes for Windows Developers." This is the only book of its kind that presents material in a functional, concise manner. It contains over 100 of the most popular regular expressions, along with explanations of how to use each one. It also covers all of the major development languages, including JavaScript, VB, VB .NET, and C#.

Author -->Nathan A. Good -->teaches by example and provides concise syntax references as necessary throughout the book. You're sure to find his examples accurate and relevant. This book is an ideal solutions guide for you to keep in a handy place for quick reference.-->Table of Contents-->Words and Text URLs and Paths CSV and Tab-Delimited Files Formatting and Validating HTML and XML Source Code

Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback,... Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback, 2005 ed.)
Heinrich Rust
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a dense real-number time model. The proposed time model is well suited to express synchronicity of events in a real-number time model as well as strict causality by using uniform discrete time steps. Thus it integrates and reconciles two views of time that are commonly used separately in di?erent application domains. In many discrete systems time is modelled by discrete steps of uniform length, in continuous systems time is seen as a dense ?ow. Themainideatointegratethesedi?erentviewsisadiscretizationofthedense real-number time structure by using constant in?nitesimal time steps within each real-number point in time. The underlying mathematical structure of this time model is based on concepts of Non-standard Analysis as proposed by Abraham Robinson in the 1950s. The discrete modelling, i.e., the descr- tion of sequential discrete algorithms at di?erent abstraction levels, is done with Abstract State Machines along the formalisms developed by Yuri Gu- vich and temporal logic. These ingredients produce a rich formal basis for describing a large variety of systems with quantitative linear time prop- ties, by seamless integration, re?nement and embedding of continuous and discrete models into one uniform semantic framework called Non-standard Timed Abstract State Machines (NTASM)."

Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005,... Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Paperback, 2005 ed.)
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
R1,640 Discovery Miles 16 400 Ships in 10 - 15 working days

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is intended to be an annual conference that brings together researchers and practitioners to provide a con?uence of new information se- rity technologies, their applications and their integration with IT systems in various vertical sectors. The Program Committee consisted of leading experts in the areas of information security, information systems, and domain experts in applications of IT in vertical business segments. The topics of the conference covered security applications and case studies, access control, network security, data security, secure architectures, and cryp- graphic techniques. Emphasis was placed on the application of security research to meet practical user requirements, both in the paper selection process and in the invited speeches. Acceptance into the conference proceedings was very competitive. The Call for Papers attracted more than 120 submissions, out of which the Program Committee selected only 35 papers for inclusion in the proceedings. Thisconferencewasmadepossibleonlythroughthecontributionsfrommany individuals and organizations. We would like to thank all the authors who s- mitted papers. We also gratefully acknowledge the members of the Program Committee and the external reviewers, for the time and e?ort they put into reviewing the submissions. Special thanks are due to Ying Qiu for managing the website for paper s- mission, reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe conference venue, and took care of the administration in running the conference

Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings... Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Paperback, 2005 ed.)
Dieter Hutter, Markus Ullmann
R1,669 Discovery Miles 16 690 Ships in 10 - 15 working days

This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services, adhocnetworking, resourceallocation/restriction, invisibility, andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ] of ] fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BS

Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.): Bruno Bouyssounouse, Joseph... Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.)
Bruno Bouyssounouse, Joseph Sifakis
R3,253 Discovery Miles 32 530 Ships in 10 - 15 working days

Embedded systems now include a very large proportion of the advanced products designed in the world, spanning transport (avionics, space, automotive, trains), electrical and electronic appliances (cameras, toys, televisions, home appliances, audio systems, and cellular phones), process control (energy production and distribution, factory automation and optimization), telecommunications (satellites, mobile phones and telecom networks), and security (e-commerce, smart cards), etc. The extensive and increasing use of embedded systems and their integration in everyday products marks a significant evolution in information science and technology. We expect that within a short timeframe embedded systems will be a part of nearly all equipment designed or manufactured in Europe, the USA, and Asia. There is now a strategic shift in emphasis for embedded systems designers: from simply achieving feasibility, to achieving optimality. Optimal design of embedded systems means targeting a given market segment at the lowest cost and delivery time possible. Optimality implies seamless integration with the physical and electronic environment while respecting real-world constraints such as hard deadlines, reliability, availability, robustness, power consumption, and cost. In our view, optimality can only be achieved through the emergence of embedded systems as a discipline in its own right.

Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005,... Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings (Paperback, 2005 ed.)
Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis
R1,752 Discovery Miles 17 520 Ships in 10 - 15 working days

Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%."

Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected... Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.

Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing... Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing Systems, Innsbruck, Austria, March 14-17, 2005, Proceedings (Paperback, 2005 ed.)
Michael Beigl, Paul Lukowicz
R1,685 Discovery Miles 16 850 Ships in 10 - 15 working days

The keychallengeforfuture computersystemis dealingwithcomplexity.Onone hand this involves internal system complexity which has increased exponentially over recent years. Here the main objectives are to maintain system reliability and to keep the design and maintenance e?ort manageable, while at the same timecontinuingtoprovidenewfunctionalityandincreasingsystemperformance. This hasbeenthe focus ofso-calledautonomouscomputing, whichaimsto bring self-con?guration and repair to a wide range of computing systems. On the other hand future computer systems are more and more becoming integrated into the fabric of everyday life and thus have to deal with the c- plexities of the real world. They will become smaller, more appropriate for their use, integrated into everyday objects, and often virtually or physically invisible to the users.They will alsobe deployedin a muchhigher quantity andpenetrate many moreapplicationareasthan traditional notionsof computer systems.This requirescomputersystemstobeadaptablewithinamuchwiderrangeofpossible tasks, subjected to much harsher conditions. To provide such features and functionality, computer devices will become tinieryetstillincreaseinsystemcomplexity;theymustconsumelesspower, while still supporting advanced computation and communications, such that they are highlyconnectedyetstilloperateasautonomousunits.Pervasiveandubiquitous computing researchaddressessuchissues by developingconcepts and technology for interweaving computers into our everyday life. The principal approach is to enhance system functionality and adaptability by recognizing context and situations in the environment

Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island,... Information Networking - Convergence in Broadband and Mobile Networking. International Conference, ICOIN 2005, Jeju Island, Korea, January 31 - February 2, 2005, Proceedings (Paperback, 2005 ed.)
Cheeha Kim
R4,773 Discovery Miles 47 730 Ships in 10 - 15 working days

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986, the conference has provided a technical forum for various issues in inf- mation networking. The theme of each conference re?ects the historic events in the computer communication industry. (Please refer to www.icoin2005.or.kr for details.) The theme of ICOIN 2004, "Convergence in Broadband and Mobile Networking," was used again for ICOIN 2005 since we believed it was ongoing. This year we received 427 submissions in total, which came from 22 co- tries. Upon submission, authors were asked to select one of the categories listed in the Call for Papers. The most popular category chosen was network se- rity, followed by mobile networks and wireless LANs. Other areas with strong showings included QoS and resource management, ad hoc and sensor networks, and wireless multimedia systems. From the outset, we could see where recent research interest lay and could make sure that the theme was still going in the right direction.

Grid Computing in Life Science - First International Workshop on Life Science Grid, LSGRID 2004 Kanazawa, Japan, May 31-June 1,... Grid Computing in Life Science - First International Workshop on Life Science Grid, LSGRID 2004 Kanazawa, Japan, May 31-June 1, 2004, Revised Selected and Invited Papers (Paperback, 2005 ed.)
Akihiko Konagaya
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

Researchers in the ?eld of life sciences rely increasingly on information te- nology to extract and manage relevant knowledge. The complex computational and data management needs of life science research make Grid technologies an attractive support solution. However, many important issues must be addressed before the Life Science Grid becomes commonplace. The 1st International Life Science Grid Workshop (LSGRID 2004) was held in Kanazawa Japan, May 31-June 1, 2004. This workshop focused on life s- ence applications of grid systems especially for bionetwork research and systems biology which require heterogeneous data integration from genome to phenome, mathematical modeling and simulation from molecular to population levels, and high-performance computing including parallel processing, special hardware and grid computing. Fruitful discussions took place through 18 oral presentations, including a keynote address and ?ve invited talks, and 16 poster and demonstration p- sentations in the ?elds of grid infrastructure for life sciences, systems biology, massive data processing, databases and data grids, grid portals and pipelines for functional annotation, parallel and distributed applications, and life science grid projects. The workshop emphasized the practical aspects of grid techno- gies in terms of improving grid-enabled data/information/knowledge sharing, high-performance computing, and collaborative projects. There was agreement among the participants that the advancement of grid technologies for life science research requires further concerted actions and promotion of grid applications. We therefore concluded the workshop with the announcement of LSGRID 2005.

From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing): Oliver Kiddle, Peter... From Bash to Z Shell - Conquering the Command Line (Paperback, 1st Corrected ed., Corr. 2nd printing)
Oliver Kiddle, Peter Stephenson, Jerry Peek
R1,779 R1,456 Discovery Miles 14 560 Save R323 (18%) Ships in 10 - 15 working days

* In-depth, unique coverage of ZSH, one of most modern and powerful of all shells. Also covers Bash, the preferred shell for most serious Linux and Unix users. * Very strong author and tech review team: Co-author Peter Stephenson has been involved in the development of Zsh since the 1990s when he started to write the FAQ. For the last few years, he has served as coordinator of the shell's development. Tech Reviewers: Ed Schaefer is the "Shell Corner" columnist for SysAdmin Magazine and Bart Schaefer is one of the lead developers of Zsh development. * Book is immediately useful, packed with short example and suggestions that the reader can put to use in their shell environment. * Extensive coverage of interactive and advanced shell features, including shell extensions, completion functions, and shortcuts. * Great book for users of all expertise; perennial seller.

Architecting Dependable Systems II (Paperback, 2004 ed.): Rogerio De Lemos, Cristina Gacek, Alexander Romanovsky Architecting Dependable Systems II (Paperback, 2004 ed.)
Rogerio De Lemos, Cristina Gacek, Alexander Romanovsky
R1,739 Discovery Miles 17 390 Ships in 10 - 15 working days

As software systems become ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be taken into account from the very beginning of the design process, it is appropriate that dependability is addressed at the architectural level.

This book results from an effort to bring together the research communities of software architectures and dependability. Inspired by the ICSE 2003 Workshop on Software Architectures for Dependable Systems, the book focuses on topics relevant to improving the state of the art in architecting dependable systems. The 15 thoroughly reviewed papers originate partly from the workshop; others were solicited in order to achieve complete coverage of all relevant aspects. The papers are organized into topical sections on architectures for dependability, fault-tolerance in software architectures, dependability analysis in software architectures, and industrial experience.

Linux-Systemadministration - Grundlagen, Konzepte, Anwendung (German, Hardcover, 2005 ed.): Christine Wolfinger, Jurgen... Linux-Systemadministration - Grundlagen, Konzepte, Anwendung (German, Hardcover, 2005 ed.)
Christine Wolfinger, Jurgen Gulbins, Carsten Hammer
R2,077 Discovery Miles 20 770 Ships in 12 - 19 working days

Linux ist eine fest etablierte, fur vielfaltige Rechnerarchitekturen verfugbare Plattform und zeichnet sich insbesondere durch die hohe Stabilitat und Sicherheit des Systems aus. Dieses Buch bietet einen fundierten Einstieg in die Linux-Systemadministration unter besonderer Berucksichtigung von SuSE-Linux. Dabei werden systematisch die Installation, Konfiguration und Aktualisierung des Systems, der Umgang mit Dateisystemen sowie die Konfiguration wichtiger Netzwerkdienste dargestellt. Ferner werden zentrale Client/Server-Funktionen und andere fur die Systemadministration wichtige Aufgaben, wie Benutzerverwaltung, Sicherung von Daten und die Lokalisierung von Fehlfunktionen, detailliert erlautert.

Der Text enthalt viele praktische Hinweise zur kompetenten Administration von Linux-Systemen, geht aber auch auf grundlegende Mechanismen von UNIX/Linux-Systemen ein. Eine Kurzreferenz gibt Auskunft uber haufig verwendete Befehle, und ein Glossar erlautert wichtige Stichworte an zentraler Stelle."

Software and Compilers for Embedded Systems - 8th International Workshop, SCOPES 2004, Amsterdam, The Netherlands, September... Software and Compilers for Embedded Systems - 8th International Workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004, Proceedings (Paperback, 2004 ed.)
Henk Schepers
R1,681 Discovery Miles 16 810 Ships in 10 - 15 working days

This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in A- terdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was referred to as the International Workshop on Code Generation for Emb- ded Systems. The ?rst took place in 1994 in Schloss Dagstuhl, Germany. From its beginnings, the intention of the organizers has been to create an interactive atmosphere in which the participants can discuss and pro't from the assembly of international experts in the ?eld. The name SCOPES has been used since the fourth edition in St. Goar, G- many, in1999whenthescopeoftheworkshopwasextendedtoalsocovergeneral issues in embedded software design. Since then SCOPES has been held again in St. Goar in 2001; Berlin, Germany in 2002; Vienna, Austria in 2003; and now in Amsterdam, The Netherlands. In response to the call for papers, almost 50 very strong papers were s- mitted from all over the world. All submitted papers were reviewed by at least three experts to ensure the quality of the workshop. In the end, the program committee selected 17 papers for presentation at the workshop. These papers are divided into the following categories: application-speci?c (co)design, system and application synthesis, data ?ow analysis, data partitioning, task scheduling and code generation. In addition to the selected contributions, the keynote address was delivered by Mike Uhler from MIPS Technologies. An abstract of his talk is also included in this volume.

Financial Cryptography and Data Security - 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica,... Financial Cryptography and Data Security - 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers (Paperback, 2005 ed.)
Andrew S. Patrick, Moti Yung
R1,756 Discovery Miles 17 560 Ships in 10 - 15 working days

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005. This conference, organized by the International Financial Cryptography Association (IFCA), continues to be the premier international forum for research, exploration, and debate regarding security in the context of finance and commerce. The conference title and scope was expanded this year to cover all aspects of securing transactions and systems. The goal is to build an interdisciplinary meeting, bringing together cryptographers, data-security specialists, business and economy researchers, as well as economists, IT professionals, implementers, and policy makers. We think that this goal was met this year. The conference received 90 submissions and 24 papers were accepted, 22 in the Research track and 2 in the Systems and Applications track. In addition, the conference featured two distinguished invited speakers, Bezalel Gavish and Lynne Coventry, and two interesting panel sessions, one on phishing and the other on economics and information security. Also, for the first time, some of the papers that were judged to be very strong but did not make the final program were selected for special invitation to our Works in Progress (Rump) Session that took place on Wednesday evening. Three papers were highlighted in this forum this year, and short versions of the papers are included here. As always, other conference attendees were also invited to make presentations during the rump session, and the evening lived up to its colorful reputation.

Secure Data Management - VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Paperback, 2004 ed.):... Secure Data Management - VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Paperback, 2004 ed.)
Willem Jonker, Milan Petkovic
R1,654 Discovery Miles 16 540 Ships in 10 - 15 working days

Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people's privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also privacy-enhanced, turns out to be a challenging goal that will also seriously in?uence the acceptance of ub- uitous computing and ambient intelligence concepts by society. With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one of the important interdisciplinary - search ?elds that brings together people from the security research community and the data management research community. The call for papers attracted 28 submissions both from universities and industry. The program committee selected 15 researchpapers for presentation at the workshop.The technical c- tributions presented at the SDM workshop are collected in this volume, which, wehope, willserveasavaluableresearchandreferencebookinyourprofessional life.

Code Generation in Microsoft .NET (Paperback, Softcover reprint of the original 1st ed.): Kathleen Dollard Code Generation in Microsoft .NET (Paperback, Softcover reprint of the original 1st ed.)
Kathleen Dollard
R1,559 R1,322 Discovery Miles 13 220 Save R237 (15%) Ships in 10 - 15 working days

Code generation has the potential to revolutionize application development. Rather than handcrafting each piece of code, enterprises will increasingly turn to code generation, based on templates and application of business logic, to automatically generate code to perform a variety of tasks. Code Generation in Microsoft . NET presents the fundamentals of code generation. Code generation is already used extensively in Visual Studio . NET - every form-based application contains potentially hundreds of lines of wizard created code, which is modified as the developer sets various properties. Strongly typed datasets, XML schemas and web service proxies are also generated automatically by Visual Studio. This results in a huge cost savings and improvement in software reliability. Developers need both the technical details of how to accomplish code generation in . NET as well as a coherent series of steps to follow to incorporate code generation into their development. Code Generation in Microsoft . NET teaches developers how to adopt these techniques in their own development efforts. code generation both within and between projects in the organization. The mechanics of code generation introduced in the book are organized around these steps, and provide the tools to leverage code generation for significant payback on the very first application where it is used.

Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings... Human Interactive Proofs - Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings (Paperback, 2005 ed.)
Henry S. Baird, Daniel P. Lopresti
R1,609 Discovery Miles 16 090 Ships in 10 - 15 working days

E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new family of security protocols - "Human Interactive Proofs" (HIPs) - which allow a person to authenticate herself as a member of a given group: e.g., as a human (vs. a machine), as herself (vs. anyoneelse), as an adult (vs. a child). Most commercial usesofHIPstodayareCAPTCHAs,"CompletelyAutomaticPublicTuringtests to tell Computers and Humans Apart," which exploit the gap in ability between humans and machine vision systems in reading images of text. HIP challenges can also be non-graphical, e.g., requiring recognition of speech, solving puzzles, etc. Wearepleasedtopresentthe?rstrefereedandarchivallypublishedcollection of state-of-the-art papers on HIPs and CAPTCHAs. Each paper was reviewed by three members of the Program Committee, judged by the Co-chairs to be of su?cient relevance and quality, and revised by the authors in response to the referees' suggestions. The papers investigate performance analysis of novel CAPTCHAs, HIP - chitectures, and the role of HIPs within security systems. Kumar Chellapilla, Kevin Larson, Patrice Simard, and Mary Czerwinski describe user trials of a CAPTCHA designed to resist segmentation attacks, including a systematic evaluation of its tolerance by human users. Henry Baird, Michael Moll, and Sui- Yu Wang analyze data from a human legibility trial of another segmentati- resistantCAPTCHAandlocateahighlylegibleengineeringregime.AmaliaRusu and Venu Govindaraju describe research towards CAPTCHAs based on reading synthetically damaged images of real images of unconstrained handwritten text.

Database Systems for Advanced Applications. DASFAA 2022 International Workshops - BDMS, BDQM, GDMA, IWBT, MAQTDS, and PMBD,... Database Systems for Advanced Applications. DASFAA 2022 International Workshops - BDMS, BDQM, GDMA, IWBT, MAQTDS, and PMBD, Virtual Event, April 11-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Uday Kiran Rage, Vikram Goyal, P. Krishna Reddy
R2,268 Discovery Miles 22 680 Ships in 12 - 19 working days

This volume constitutes the papers of several workshops which were held in conjunction with the 27th International Conference on Database Systems for Advanced Applications, DASFAA 2022, held as virtual event in April 2022. The 30 revised full papers presented in this book were carefully reviewed and selected from 65 submissions. DASFAA 2022 presents the following five workshops: * First workshop on Pattern mining and Machine learning in Big complex Databases (PMBD 2021) * 6th International Workshop on Graph Data Management and Analysis (GDMA 2022) * First International Workshop on Blockchain Technologies (IWBT2022) * 8th International Workshop on Big Data Management and Service (BDMS 2022) * First workshop on Managing Air Quality Through Data Science * 7th International Workshop on Big Data Quality Management (BDQM 2022).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Electrophoresis - Theory and Practice
Budin Michov Hardcover R7,204 Discovery Miles 72 040
Reagent Chemicals - Specifications and…
Acs Committee on Analytical Reagents Hardcover R10,318 Discovery Miles 103 180
ICP-MS and Trace Element Analysis as…
Marco Aurelio Zezzi Arruda, Jemmyson Romario De Jesus Hardcover R7,475 Discovery Miles 74 750
Global Risk-Based Management of Chemical…
Bernd Bilitewski, Rosa Mari Darbra, … Hardcover R9,513 Discovery Miles 95 130
Angelo Secchi and Nineteenth Century…
Ileana Chinnici, Guy Consolmagno Hardcover R3,992 Discovery Miles 39 920
The Nile River
Abdelazim M. Negm Hardcover R13,286 Discovery Miles 132 860
Advances in Teaching Physical Chemistry
Mark D. Ellison, Tracy A. Schoolcraft Hardcover R5,737 Discovery Miles 57 370
Assessing Exposures and Reducing Risks…
James N. Seiber, Robert I. Krieger, … Hardcover R2,210 Discovery Miles 22 100
Environmental Chemistry for a…
Eric Lichtfouse, Jan Schwarzbauer, … Hardcover R4,688 Discovery Miles 46 880
Calibration and Validation of Analytical…
Mark T. Stauffer Hardcover R3,503 Discovery Miles 35 030

 

Partners