Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This book constitutes the refereed proceedings of the Second International Conference on Embedded Software, EMSOFT 2002, held in Grenoble, France in October 2002.The book presents 13 invited papers by leading researchers and 17 revised full papers selected during a competitive round of reviewing. The book spans the whole range of embedded software, including operating systems and middleware, programming languages and compilers, modeling and validation, software engineering and programming methodologies, scheduling and execution-time analysis, formal methods, and communication protocols and fault-tolerance
"Writing Perl Modules for CPAN" offers Perl developers a comprehensive guide to using and contributing to the Comprehensive Perl Archive Network (CPAN). Starting with a general overview of CPAN's history, network topology, and navigational mechanisms, the book quickly brings you up-to-speed regarding how to search out and install available modules. However, in the true open source spirit, author and experienced Perl developer Sam Tregar teaches you how to not only use, but also contribute to CPAN via an in-depth discussion of module creation, submission, and maintenance. Beginning with a survey of basic design principles, Tregar takes care to discuss all issues relevant to developers wishing to create great Perl modules, including choosing a proper name, properly using Perl's POD (plain old documentation) feature, concepts surrounding functional and object-oriented API development, and much more. Tregar then proceeds with a complete dissertation of how modules should conform to CPAN module specifications, covering required distribution files and coding considerations, in addition to offering advice regarding proper module testing. After demonstrating how to create a module and prepare it for release, Tregar guides you through the CPAN module submission process and discusses module maintenance once the module has been contributed to the CPAN service. "Writing Perl Modules for CPAN" is an indispensable guide for anyone wishing to make the most of the CPAN service.
"User Interfaces in VB. NET: Windows Forms and Custom Controls" goes beyond simple coverage of the Windows Forms and GDI+ namespaces by combining a careful treatment of the API with a detailed discussion of good user-interface design principles. After reading "User Interfaces in VB. NET: Windows Forms and Custom Controls," you'll know how to design state-of-the-art application interfaces, program graphics, and much more. This book contains the following: An overview of how to design elegant user interfaces the average user can understand A comprehensive examination of the user interface controls and classes in .NET Best practices and design tips for coding user interfaces and integrating help Although this book isn't a reference, it does contain detailed discussions about every user interface element you'll use on a regular basis. But you won't just learn how to use .NET controlsyou'll learn how and why to extend them with your own custom controls. As a developer, you need to know more than how to add a control to a window. You also need to know how to create an entire user interface framework that's scalable, flexible, and reusable.
Das vorliegende Handbuch wendet sich an Debian-User, die uber ein vollstandig installiertes und konfiguriertes System verfugen, und nun das breite Spektrum der Anwendungen nutzen mochten. Im einzelnen werden folgende Themen behandelt: Datenorganisation (Benutzer- und Terminverwaltung, Groupware), Datenhaltung in Datenbanken (PostgreSQL, MySQL), Gestaltung von Grafiken (xfig, gnuplot, freie CAD-Programme), Bildverarbeitung (Gimp), wichtige Anwendungen zur Netzwerkkommunikation (ftp, E-Mail, write, talk, IRC, Instant Messaging, Voice over IP). Ferner werden freie Programme zur Tabellenkalkulation (Gnumeric) und zur Textverarbeitung (vi, Emacs, LaTeX, RCS, CVS) vorgestellt, eine Einfuhrung in die Computer-Algebra mittels Maple gegeben und gangige UNIX-Werkzeuge sowie die Office-Suiten OpenOffice und StarOffice in ihrer Basisfunktionalitat dargestellt. Dieses Werk bietet die optimale Erganzung zum Buch Debian GNU/Linux Grundlagen, Installation Administration und Anwendung von Peter H. Ganten und Wulf Alex."
This book constitutes the refereed proceedings of the First International Conference on Soft-Ware 2002, held in Belfast, North Ireland in April 2002.The 24 revised full papers presented together with seven abstracts of invited presentations and the summary of a panel were carefully reviewed and selected for inclusion in the book. All presentations are devoted to the effective handling of soft issues in the design, development, and operation of computing systems, from an academic research point of view as well as from the point of view of industrial practice. The papers aim at integrating an interdisciplinary range of disciplines including artificial intelligence, information systems, software engineering, and systems engineering.
This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers' Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program also included two invited talks by Ron Rivest ("Micropayments Revisited" - joint work with Silvio Micali) and by Victor Shoup ("The Bumpy Road from Cryptographic Theory to Practice"). Each paper was reviewed by at least three program committee members; paperswrittenbyprogramcommitteemembersreceivedsixreviews.Theauthors of accepted papers made a substantial e?ort to take into account the comments intheversionsubmittedtotheseproceedings.Inalimitednumberofcases, these revisions were checked by members of the program committee. I would like to thank the 20 members of the program committee who helped to maintain the rigorous scienti?c standards to which the Cryptographers' Track aims to adhere. They wrote thoughtful reviews and contributed to long disc- sions; more than 400 Kbyte of comments were accumulated. Many of them - tended the program committee meeting, while they could have been enjoying the sunny beaches of Santa Barbara.
This volume presents twelve case studies that use RAISE - Rigorous Approach to Industrial Software Engineering - to construct, analyse, develop and apply formal specifications. The case studies cover a wide range of application areas including government finance, case-based reasoning, multi-language text processing, object-oriented design patterns, component-based software design and natural resource management. By illustrating the variety of uses of formal specifications, the case studies also raise questions about the creation, purpose and scope of formal models before they are built. Additional resources and complete specifications for all of the case studies and the RAISE tools used to process them, are available on the World Wide Web. This book will be of particular interest to software engineers, especially those responsible for the initial stages of requirements engineering and software architecture and design. It will also be of interest to academics and students on advanced formal methods courses.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Selected Areas in Cryptology, SAC 2001, held in Toronto, Ontario, Canada in August 2001.The 25 revised full papers presented together with the abstracts of two invited talks were carefully reviewed and selected during two rounds of refereeing and revision. The papers are organized in topical sections on cryptanalysis, Boolean functions, Rijndael, elliptic curves and efficient implementation, public key systems, and protocols and MAC.
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2000, held in Yorktown Heights, NY, USA, in August 2000. The 22 revised full papers presented together with 5 posters were carefully selected during two rounds of reviewing and improvement. All current aspects of parallel processing are addressed with emphasis on issues in optimizing compilers, languages, and software environments in high-performance computing.
This book constitutes the refereed proceedings of the Third International COST264 Workshop on Networked Group Communication, NGC 2001, held in London, UK, in November 2001.The 14 revised full papers presented were carefully reviewed and selected from 40 submissions. All current issues in the area are addressed. The papers are organized in topical sections on application-level aspects, group management, performance topics, security, and topology.
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2001, held in Cambridge, MA, USA, in June 2001.The 11 revised full papers presented were carefully selected and improved during two rounds of reviewing and revision, and present state-of-the-art results in the area.
This book constitutes the refereed proceedings of the IFIP/ACM
International Conference on Distributed Systems Platforms,
Middleware 2001, held in Heidelberg, Germany, in November
2001.
The chapters in this book are revised, updated, and edited versions of 13 selected papers from the Second International Conference on Cooperative Multimodal Communication (CMC'98), held in Tilburg, The Netherlands, in 1998.This wasthesecondconferencein a series,ofwhichthe ?rstonewasheld inEindhoven,TheNetherlands,in1995.Threeofthesepaperswerepresentedby invitedspeakers;thosebyDoniaScott(co-authoredwithRichardPower),Steven Feiner (co-authored with Michele Zhou), and Oliviero Stock (co-authored with Carlo Strapparava and Massimo Zancanaro). The other ten were among the submitted papers that were accepted by the CMC'98 program committee. The editors contributed an introductory chapter to set the stage for the rest of the book. We thank the programcommittee for their excellent and timely feedback to the authors of the submitted papers, and at a later stage for advising on the contents of this volume and for providing additional suggestions for improving theselectedcontributions.Theprogramcommittee consistedofNicholasAsher, NormannBadler,DonBouwhuis,HarryBunt,WalthervonHahn,DieterHuber, Hans Kamp, John Lee, Joseph Mariani, Jean-Claude Martin, Mark Maybury, PaulMcKevitt, RobNederpelt, KeesvanOverveld,RayPerrault,Donia Scott, Jan Treur, Wolfgang Wahlster, Bonnie Webber, Kent Wittenburg, and Henk Zeevat. WethanktheRoyalDutchAcademyofSciences(KNAW)andtheOrga- zationforCooperationamongUniversitiesinBrabant(SOBU)fortheirgrants that supported the conference.
This book constitutes the refereed proceedings of the 8th International Conference on User Modeling, UM 2001, held in Sonthofen, Germany in July 2001.The 19 revised full papers and 20 poster summaries presented together with summaries of 12 selected student presentations were carefully reviewed and selected from 79 submissions. The book offers topical sections on acquiring user models from multi-modal user input; learning interaction models; user models for natural language interpretation, processing, and generation; adaptive interviewing for acquiring user preferences and product customization; supporting user collaboration through adaptive agents; student modeling; and adaptive information filtering, retrieval, and browsing.
The importance of typed languages for building robust software systems is, by now, an undisputed fact. Years of research have led to languages with richly expressive, yet easy to use, type systems for high-level programming languages. Types provide not only a conceptual framework for language designers, but also a ord positive bene ts to the programmer, principally the ability to express and enforce levels of abstraction within a program. Early compilers for typed languages followed closely the methods used for their untyped counterparts. The role of types was limited to the earliest s- ges of compilation, and they were thereafter ignored during the remainder of the translation process. More recently, however, implementors have come to - cognize the importance of types during compilation and even for object code. Several advantages of types in compilation have been noted to date: { They support self-checking by the compiler. By tracking types during c- pilation it is possible for an internal type checker to detect translation errors at an early stage, greatly facilitating compiler development. { They support certi cation of object code. By extending types to the ge- rated object code, it becomes possible for a code user to ensure the basic integrity of that code by checking its type consistency before execution. { They support optimized data representations and calling conventions, even in the presence of modularity. By passing types at compile-, link-, and even run-time, it is possible to avoid compromises of data representation imposed by untyped compilation techniques.
Building on classical queueing theory mainly dealing with single node queueing systems, networks of queues, or stochastic networks has been a field of intensive research over the last three decades. Whereas the first breakthrough in queueing network theory was initiated by problems and work in operations research, the second breakthrough, as well as subsequent major work in the area, was closely related to computer science, particularly to performance analysis of complex systems in computer and communication science.The text reports on recent research and development in the area. It is centered around explicit expressions for the steady behavior of discrete time queueing networks and gives a moderately positive answer to the question of whether there can be a product form calculus in discrete time. Originating from a course given by the author at Hamburg University, this book is ideally suited as a text for courses on discrete time stochastic networks.
This book constitutes the refereed proceedings of the 10th International Conference on Compiler Construction, CC 2001, held in Genova, Italy in April 2001.The 22 revised full papers presented were carefully reviewed and selected from a total of 69 submissions. The papers are organized in topical sections on program analysis, program transformation, intraprocessor parallelism, parsing, memory hierarchy, profiling, and demos.
"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract concepts accessible for a wide audience." Janos Sztipanovits, Director E. Bronson Ingram Distinguished Professor of Engineering Institute for Software Integrated Systems Vanderbilt University Real-Time Systems focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the Second Edition, new developments in communication standards for time-sensitive networks, such as TSN and Time-Triggered Ethernet are addressed. Furthermore, this edition includes a new chapter on real-time aspects in cloud and fog computing. The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike.
This volume contains the papers presented at the International Workshop on Tools for Working with Guidelines, (TFWWG 2000), held in Biarritz, France, in October 2000. It is the final outcome of the International Special Interest Group on Tools for Working with Guidelines.Human-computer interaction guidelines have been recognized as a uniquely relevant source for improving the usability of user interfaces for interactive systems. The range of interactive techniques exploited by these interactive systems is rapidly expanding to include multimodal user interfaces, virtual reality systems, highly interactive web-based applications, and three-dimensional user interfaces. Therefore, the scope of guidelines' sources is rapidly expanding as well, and so are the tools that should support users who employ guidelines to ensure some form of usability.Tools For Working With Guidelines (TFWWG) covers not only software tools that designers, developers, and human factors experts can use to manage multiple types of guidelines, but also looks at techniques addressing organizational, sociological, and technological issues.
This volume contains the papers prepared for the 2nd International Conference on Natural Language Processing, held 2-4 June in Patras, Greece. The conference program features invited talks and submitted papers, c- ering a wide range of NLP areas: text segmentation, morphological analysis, lexical knowledge acquisition and representation, grammar formalism and s- tacticparsing, discourse analysis, languagegeneration, man-machineinteraction, machine translation, word sense disambiguation, and information extraction. The program committee received 71 abstracts, of which unfortunately no more than 50% could be accepted. Every paper was reviewed by at least two reviewers. The fairness of the reviewing process is demonstrated by the broad spread of institutions and countries represented in the accepted papers. So many have contributed to the success of the conference. The primary credit, ofcourse, goes to theauthors andto the invitedspeakers. By theirpapers and their inspired talks they established the quality of the conference. Secondly, thanks should go to the referees and to the program committee members who did a thorough and conscientious job. It was not easy to select the papers to be presented. Last, but not least, my special thanks to the organizing committee for making this conference happ
ETAPS2000 was the third instance of the EuropeanJoint Conferenceson Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998 by combining a number of existing and new conferences. This year it comprised ?ve conferences (FOSSACS, FASE, ESOP, CC, TACAS), ?ve satellite workshops (CBS, CMCS, CoFI, GRATRA, INT), seven invited lectures, a panel discussion, and ten tutorials. The events that comprise ETAPS address various aspects of the system - velopment process, including speci?cation, design, implementation, analysis, and improvement. The languages, methodologies, and tools which support these - tivities are all well within its scope. Di?erent blends of theory and practice are represented, with an inclination towards theory with a practical motivation on one hand and soundly-based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.
ThePKC2000conferencewasheldattheMelbourneExhibitionCentre, Victoria, Australia, January 18-20, 2000. It was the third conference in the international workshop series dedicated to practice and theory in public key cryptography. The program committee of the conference received 70 full submissions from around the world, of which 31 were selected for presentation. All submissions were reviewed by experts in the relevant areas. The program committee consisted of 19 experts in cryptography and data se- rity drawn from the international research community, these being Chin-Chen Chang (National Chung Cheng University, Taiwan), Claude Cr epeau (McGill University, Canada), Ed Dawson (Queensland University of Technology, A- tralia), Yvo Desmedt (Florida State University, USA), Hideki Imai (Co-chair, UniversityofTokyo, Japan), MarkusJakobsson(BellLabs, USA), KwangjoKim (Information and Communications University, Korea), Arjen Lenstra (Citibank, USA), TsutomuMatsumoto(YokohamaNationalUniversity, Japan), DavidN- cache (Gemplus, France), Eiji Okamoto (University of Wisconsin-Milwaukee, USA), TatsuakiOkamoto(NTTLabs, Japan), JosefPieprzyk(UniversityofW- longong, Australia), Jean-Jacques Quisquater (Universit e Catholique de L- vain, Belgium), Nigel Smart (HP Labs Bristol, UK), Vijay Varadharajan (U- versity of Western Sydney, Australia), Serge Vaudenay (Ecole Polytechnique F ed erale de Lausanne, Switzerland), Moti Yung (CertCo, USA), and Yuliang Zheng (Co-chair, Monash University, Australia). Members of the committee spent numerous hours in reviewing the submissions and providing advice and comments on the selection of paper
Approaches to project scheduling under resource constraints are discussed in this book. After an overview of different models, it deals with exact and heuristic scheduling algorithms. The focus is on the development of new algorithms. Computational experiments demonstrate the efficiency of the new heuristics. Finally, it is shown how the models and methods discussed here can be applied to projects in research and development as well as market research.
This volume contains the papers presented at the f th workshop on Job SchedulingStrategiesforParallelProcessing, whichwasheldinconjunctionwith the IPPS/SPDP 99conference in San Juan, Puerto Rico, on April 16, 1999.The papers have been through a complete refereeing process, with the full version beingreadandevaluatedbyv etosevenmembersoftheprogramcommittee.We would like to take this opportunity to thank the program committee, Andrea Arpaci-Dusseau, Stephen Booth, Allen Downey, Allan Gottlieb, Atsushi Hori, PhilKrueger, RichardLagerstrom, MironLivny, VirginiaLo, ReaganMoore, Bill Nitzberg, UweSchwiegelshohn, KenSevcik, MarkSquillante, andJohnZahorjan, for an excellent job. Thanks are also due to the authors for their submissions, presentations, and nal revisionsfor this volume. Finally, we wouldlike to thank the MIT Laboratory for Computer Science and the Computer Science Institute at the Hebrew Universityfor the use of their facilities in the preparationof these proceedings. Thiswasthe fth annualworkshopinthis series, whichre?ectsthe continued interest in this eld. The previous four were held in conjunction with IPPS 95 through IPPS/SPDP 98. Their proceedings are available from Springer-Verlag as volumes 949, 1162, 1291, and 1459 of the Lecture Notes in Computer Science series. Sinceour rstworkshop, parallelprocessinghas evolvedtothe pointwhereit is no longer synonymous with scienti c computing on massively parallel sup- computers. In fact, enterprise computing on one hand and metasystems on the other hand often overshadow the original uses of parallel processing. This shift has underscored the importance of job scheduling in multi-user parallelsystems. Correspondingly, we had a session in the workshop devoted to job scheduling on standalonesystems, emphasizing gang scheduling, and another on scheduling for meta-systems. A third session continued the trend from previous workshops of discussing evaluation methodology and workloads. Aninnovationthisyearwasapaneldiscussiononthepossiblestandardization ofaworkloadbenchmarkthatwillservefortheevaluationofdi erentsche
This volume constitutes the refereed proceedings of the Second
International Conference on Scale-Space Theories in Computer
Vision, Scale-Space'99, held in Corfu, Greece, in September
1999. |
You may like...
VLSI-SoC: New Technology Enabler - 27th…
Carolina Metzler, Pierre-Emmanuel Gaillardon, …
Hardcover
R1,520
Discovery Miles 15 200
A C/OS-III for the Renesas RX62N
J Labrosse Jean, Kovalski Fabiano
Hardcover
R1,791
Discovery Miles 17 910
|