0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (4)
  • R100 - R250 (654)
  • R250 - R500 (2,120)
  • R500+ (12,302)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Ontology Management - Semantic Web, Semantic Web Services, and Business Applications (Hardcover, 2008 ed.): Martin Hepp, Pieter... Ontology Management - Semantic Web, Semantic Web Services, and Business Applications (Hardcover, 2008 ed.)
Martin Hepp, Pieter De Leenheer, Aldo De Moor, York Sure
R2,687 Discovery Miles 26 870 Ships in 18 - 22 working days

Ontology Managememt provides an up-to-date, scientifically correct, concise and easy-to-read reference on this topic. The book includes relevant tasks, practical and theoretical challenges, limitations and methodologies, plus available tooling support. The editors discuss integrating the conceptual and technical dimensions with a business view on using ontologies, stressing the cost dimension of ontology engineering and offering guidance on how to derive ontologies semi-automatically from existing standards and specifications.

Black Families Online - Directory of Online Resources for Black Parents (Hardcover): Stacey Montgomery Black Families Online - Directory of Online Resources for Black Parents (Hardcover)
Stacey Montgomery
R633 R577 Discovery Miles 5 770 Save R56 (9%) Ships in 18 - 22 working days

You want to find an Afrocentric video or a Black history game for your child but no store in your area offers them. You are considering home schooling your child, but would like to first discuss it with Black families that are already home schooling. You want to take your family to see the "Black rodeo," but do not have a tour schedule. You are about to have a baby and would like to send out Afrocentric birth announcements, but cannot find any.

Help is here With the click of a mouse, products, services and information aimed at Black families are immediately accessible "Black Families Online" takes you on a journey through Cyberspace, directing you to hundreds of online resources for Black parents, kids, educators, and anyone seeking multiculturalism. "Black Families Online" shows you how easy it is to get things done without leaving the house: Research your family history Decorate your baby's room with Afrocentric bedding and accessories Learn how to braid your daughter's hair Find Afrocentric educational tools Learn Black history Find college scholarships Meet moms and dads like you: SAHMs, families with biracial children, home schooling families, and more

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R4,420 Discovery Miles 44 200 Ships in 18 - 22 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Methodologies and Application Issues of Contemporary Computing Framework (Hardcover, 1st ed. 2018): Jyotsna Kumar Mandal,... Methodologies and Application Issues of Contemporary Computing Framework (Hardcover, 1st ed. 2018)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
R2,656 Discovery Miles 26 560 Ships in 18 - 22 working days

This book brings together the diversified areas of contemporary computing frameworks in the field of Computer Science, Engineering and Electronic Science. It focuses on various techniques and applications pertaining to cloud overhead, cloud infrastructure, high speed VLSI circuits, virtual machines, wireless and sensor networks, clustering and extraction of information from images and analysis of e-mail texts. The state-of-the-art methodologies and techniques are addressed in chapters presenting various proposals for enhanced outcomes and performances. The techniques discussed are useful for young researchers, budding engineers and industry professionals for applications in their respective fields.

Artificial Intelligence in Theory and Practice III - Third IFIP TC 12 International Conference on Artificial Intelligence, IFIP... Artificial Intelligence in Theory and Practice III - Third IFIP TC 12 International Conference on Artificial Intelligence, IFIP AI 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, Edition.)
Max Bramer
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

The papers in this volume comprise the refereed proceedings of the conference Arti- cial Intelligence in Theory and Practice (IFIP AI 2010), which formed part of the 21st World Computer Congress of IFIP, the International Federation for Information Pr- essing (WCC-2010), in Brisbane, Australia in September 2010. The conference was organized by the IFIP Technical Committee on Artificial Int- ligence (Technical Committee 12) and its Working Group 12.5 (Artificial Intelligence Applications). All papers were reviewed by at least two members of our Program Committee. - nal decisions were made by the Executive Program Committee, which comprised John Debenham (University of Technology, Sydney, Australia), Ilias Maglogiannis (University of Central Greece, Lamia, Greece), Eunika Mercier-Laurent (KIM, France) and myself. The best papers were selected for the conference, either as long papers (maximum 10 pages) or as short papers (maximum 5 pages) and are included in this volume. The international nature of IFIP is amply reflected in the large number of countries represented here. I should like to thank the Conference Chair, Tharam Dillon, for all his efforts and the members of our Program Committee for reviewing papers under a very tight de- line.

Card Sorting - Designing Usable Categories (Paperback): Donna Spencer Card Sorting - Designing Usable Categories (Paperback)
Donna Spencer
R1,374 Discovery Miles 13 740 Ships in 18 - 22 working days
Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016): Georgi M. Dimirovski Complex Systems - Relationships between Control, Communications and Computing (Hardcover, 1st ed. 2016)
Georgi M. Dimirovski
R4,216 Discovery Miles 42 160 Ships in 18 - 22 working days

This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity and survivability at the same time retaining desired performance quality. Applications in the individual chapters are drawn from: * the general implementation of model-based diagnosis and systems engineering in medical technology, in communication, and in power and airport networks; * the creation of biologically inspired control brains and safety-critical human-machine systems, * process-industrial uses; * biped robots; * large space structures and unmanned aerial vehicles; and * precision servomechanisms and other advanced technologies. Complex Systems provides researchers from engineering, applied mathematics and computer science backgrounds with innovative theoretical and practical insights into the state-of-the-art of complex networks and systems research. It employs physical implementations and extensive computer simulations. Graduate students specializing in complex-systems

Safety Message Broadcast in Vehicular Networks (Hardcover, 1st ed. 2017): Yuanguo Bi, Haibo Zhou, Weihua Zhuang, Hai Zhao Safety Message Broadcast in Vehicular Networks (Hardcover, 1st ed. 2017)
Yuanguo Bi, Haibo Zhou, Weihua Zhuang, Hai Zhao
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature.A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle-to-infrastructure communications.This book offers useful insights into protocol design and inspires a new line of thinking in performance improvements for safety applications in vehicular networks. It is a valuable resource for professionals, researchers, or advanced-level students working in vehicular networks or quality of service.

EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed.... EAI International Conference on Technology, Innovation, Entrepreneurship and Education - TIE'2017 (Hardcover, 1st ed. 2019)
Angelica Reyes-Munoz, Ping Zheng, David Crawford, Victor Callaghan
R4,068 Discovery Miles 40 680 Ships in 18 - 22 working days

This book presents the proceedings of the 1st EAI International Conference on Technology, Innovation, Entrepreneurship and Education (TIE 2017), which took place at Canterbury Christ Church University on September 11-12, 2017. The central theme of the conference is creativity and innovation, especially in relation to technology, business, education, social and political needs that make modern society flourish. The proceedings feature papers from a cross-disciplinary audience that explore the process of creativity and innovation. The goal is that the various disciplines can learn from each other and see how they might benefit from the cross-fertilization of practices.

Web Application Design Patterns (Paperback): Pawan Vora Web Application Design Patterns (Paperback)
Pawan Vora
R1,230 Discovery Miles 12 300 Ships in 10 - 15 working days

Ever notice that in spite of their pervasiveness designing web applications is still challenging? While their benefits motivate their creation, there are no well-established guidelines for design. This often results in inconsistent behaviors and appearances, even among web applications created by the same company.
Design patterns for web applications, similar in concept to those for web sites and software design, offer an effective solution. In Web Application Design Patterns, Pawan Vora documents design patterns for web applications by not only identifying design solutions for user interaction problems, but also by examining the rationale for their effectiveness, and by presenting how they should be applied.
Design interfaces faster, with a better rationale for the solutions you choose.
Learn from over more than 100 patterns, with extensive annotation on use and extension.
Take a short-cut into understanding the industry with more than 500 full-color screenshots and a web site for help, discussion, and a collection of additional patterns."

Fuzzy Logic and the Semantic Web, Volume 1 (Hardcover): Elie Sanchez Fuzzy Logic and the Semantic Web, Volume 1 (Hardcover)
Elie Sanchez
R4,158 Discovery Miles 41 580 Ships in 10 - 15 working days

These are exciting times in the fields of Fuzzy Logic and the Semantic Web, and this book will add to the excitement, as it is the first volume to focus on the growing connections between these two fields. This book is expected to be a valuable aid to anyone considering the application of Fuzzy Logic to the Semantic Web, because it contains a number of detailed accounts of these combined fields, written by leading authors in several countries. The Fuzzy Logic field has been maturing for forty years. These years have witnessed a tremendous growth in the number and variety of applications, with a real-world impact across a wide variety of domains with humanlike behavior and reasoning. And we believe that in the coming years, the Semantic Web will be major field of applications of Fuzzy Logic.


This book, the first in the new series Capturing Intelligence, shows the positive role Fuzzy Logic, and more generally Soft Computing, can play in the development of the Semantic Web, filling a gap and facing a new challenge. It covers concepts, tools, techniques and applications exhibiting the usefulness, and the necessity, for using Fuzzy Logic in the Semantic Web. It finally opens the road to new systems with a high Web IQ.


Most of today's Web content is suitable for human consumption. The Semantic Web is presented as an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. For example, within the Semantic Web, computers will understand the meaning of semantic data on a web page by following links to specified ontologies. But while the Semantic Web vision and research attracts attention, as long as it will be used two-valued-based logical methods no progress will be expected in handling ill-structured, uncertain or imprecise information encountered in real world knowledge. Fuzzy Logic and associated concepts and techniques (more generally, Soft Computing), has certainly a positive role to play in the development of the Semantic Web. Fuzzy Logic will not supposed to be the basis for the Semantic Web but its related concepts and techniques will certainly reinforce the systems classically developed within W3C.


In fact, Fuzzy Logic cannot be ignored in order to bridge the gap between human-understandable soft logic and machine-readable hard logic. None of the usual logical requirements can be guaranteed: there is no centrally defined format for data, no guarantee of truth for assertions made, no guarantee of consistency. To support these arguments, this book shows how components of the Semantic Web (like XML, RDF, Description Logics, Conceptual Graphs, Ontologies) can be covered, with in each case a Fuzzy Logic focus.


Key features.


- First volume to focus on the growing connections between Fuzzy Logic and the Semantic Web.
- Keynote chapter by Lotfi Zadeh.
- The Semantic Web is presently expected to be a major field of applications of Fuzzy Logic.
- It fills a gap and faces a new challenge in the development of the Semantic Web.
- It opens the road to new systems with a high Web IQ.
- Contributed chapters by Fuzzy Logic leading experts.
- First volume to focus on the growing connections between Fuzzy Logic and the Semantic Web.
- Keynote chapter by Lotfi Zadeh.
- The Semantic Web is presently expected to be a major field of applications of Fuzzy Logic.
- It fills a gap and faces a new challenge in the development of the Semantic Web.
- It opens the road to new systems with a high Web IQ.
- Contributed chapters by Fuzzy Logic leading experts.

Information Sciences and Systems 2014 - Proceedings of the 29th International Symposium on Computer and Information Sciences... Information Sciences and Systems 2014 - Proceedings of the 29th International Symposium on Computer and Information Sciences (Hardcover)
Tadeusz Czachorski, Erol Gelenbe, Ricardo Lent
R4,110 R3,557 Discovery Miles 35 570 Save R553 (13%) Ships in 10 - 15 working days

Based on a rigorous selection of submissions to The 29th International Symposium on Computer and Information Sciences (ISCIS 2014), this books includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. It offers the reader a timely access to innovative research and advances in computing and communications from many different areas of the world. The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging. The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27-8, 2014.

Cross-Layer Design in Optical Networks (Hardcover, 2013 ed.): Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava... Cross-Layer Design in Optical Networks (Hardcover, 2013 ed.)
Suresh Subramaniam, Maite Brandt-Pearce, Piet Demeester, Chava Vijaya Saradhi
R5,378 R4,787 Discovery Miles 47 870 Save R591 (11%) Ships in 10 - 15 working days

This work addresses the topic of optical networks cross-layer design with a focus on physical-layer-impairment-aware design. Contributors captures both the physical-layer-aware network design as well as the latest advances in service-layer-aware network design. Treatment of topics such as, optical transmissions which are prone to signal impairments, dense packing of wavelengths, dispersion, crosstalk, etc., as well as how to design the network to mitigate such impairments, are all covered.

Java Cryptography Extensions - Practical Guide for Programmers (Paperback): Jason R. Weiss Java Cryptography Extensions - Practical Guide for Programmers (Paperback)
Jason R. Weiss
R960 Discovery Miles 9 600 Ships in 10 - 15 working days

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM
For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it s imperative that developers know what kinds of solutions exist.
One of Java s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources"

Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016): Michael Workman Semantic Web - Implications for Technologies and Business Practices (Hardcover, 1st ed. 2016)
Michael Workman
R4,138 R3,337 Discovery Miles 33 370 Save R801 (19%) Ships in 10 - 15 working days

This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.

Human Computer Interaction Research in Web Design and Evaluation (Hardcover): Human Computer Interaction Research in Web Design and Evaluation (Hardcover)
R2,493 Discovery Miles 24 930 Ships in 18 - 22 working days

Human Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense. ""Human Computer Interaction Research in Web Design and Evaluation"" is a comprehensive book on HCI and Web design that focuses on various areas of research including theories, analysis, design, and evaluation. This book not only features the human aspect of Web design, but also highlights the social and cultural issues in designing for a wider audience.

Detection and Mitigation of Insider Attacks in a Cloud Infrastructure - Emerging Research and Opportunities (Hardcover): T.... Detection and Mitigation of Insider Attacks in a Cloud Infrastructure - Emerging Research and Opportunities (Hardcover)
T. Gunasekhar, K. Thirupathi Rao, P. Sai Kiran, V. Krishna Reddy, B. Thirumala Rao
R4,070 Discovery Miles 40 700 Ships in 18 - 22 working days

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

The Thousand Faces of Virtual Reality (Hardcover): Cecilia Sik Lanyi The Thousand Faces of Virtual Reality (Hardcover)
Cecilia Sik Lanyi
R3,094 Discovery Miles 30 940 Ships in 18 - 22 working days
Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires,... Software Services for e-World - 10th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2010, Buenos Aires, Argentina, November 3-5, 2010, Proceedings (Hardcover, 2010 Ed.)
Wojciech Cellary, Elsa Estevez
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

th I3E 2010 marked the 10 anniversary of the IFIP Conference on e-Business, e- Services, and e-Society, continuing a tradition that was invented in 1998 during the International Conference on Trends in Electronic Commerce, TrEC 1998, in Hamburg (Germany). Three years later the inaugural I3E 2001 conference was held in Zurich (Switzerland). Since then I3E has made its journey through the world: 2002 Lisbon (Portugal), 2003 Sao Paulo (Brazil), 2004 Toulouse (France), 2005 Poznan (Poland), 2006 Turku (Finland), 2007 Wuhan (China), 2008 Tokyo (Japan), and 2009 Nancy (France). I3E 2010 took place in Buenos Aires (Argentina) November 3-5, 2010. Known as "The Pearl" of South America, Buenos Aires is a cosmopolitan, colorful, and vibrant city, surprising its visitors with a vast variety of cultural and artistic performances, European architecture, and the passion for tango, coffee places, and football disc- sions. A cultural reference in Latin America, the city hosts 140 museums, 300 theaters, and 27 public libraries including the National Library. It is also the main educational center in Argentina and home of renowned universities including the U- versity of Buenos Aires, created in 1821. Besides location, the timing of I3E 2010 is th also significant--it coincided with the 200 anniversary celebration of the first local government in Argentina.

Dividend Investing For Beginners - Learn The Basics Of Dividend Investing And Strategies In 5 Days And Learn It Well... Dividend Investing For Beginners - Learn The Basics Of Dividend Investing And Strategies In 5 Days And Learn It Well (Hardcover)
Michael Ezeanaka
R656 Discovery Miles 6 560 Ships in 18 - 22 working days
Cloud Data Management (Hardcover, 2014 ed.): Liang Zhao, Sherif Sakr, Anna Liu, Athman Bouguettaya Cloud Data Management (Hardcover, 2014 ed.)
Liang Zhao, Sherif Sakr, Anna Liu, Athman Bouguettaya
R3,368 R1,868 Discovery Miles 18 680 Save R1,500 (45%) Ships in 10 - 15 working days

In practice, the design and architecture of a cloud varies among cloud providers. We present a generic evaluation framework for the performance, availability and reliability characteristics of various cloud platforms. We describe a generic benchmark architecture for cloud databases, specifically NoSQL database as a service. It measures the performance of replication delay and monetary cost.

Service Level Agreements (SLA) represent the contract which captures the agreed upon guarantees between a service provider and its customers. The specifications of existing service level agreements (SLA) for cloud services are not designed to flexibly handle even relatively straightforward performance and technical requirements of consumer applications. We present a novel approach for SLA-based management of cloud-hosted databases from the consumer perspective and an end-to-end framework for consumer-centric SLA management of cloud-hosted databases. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the monetary cost of the allocated computing resources. In this framework, the SLA of the consumer applications are declaratively defined in terms of goals which are subjected to a number of constraints that are specific to the application requirements. The framework continuously monitors the application-defined SLA and automatically triggers the execution of necessary corrective actions (scaling out/in the database tier) when required. The framework is database platform-agnostic, uses virtualization-based database replication mechanisms and requires zero source code changes of the cloud-hosted software applications.

Beginner Forex Traders Money Making Guidebook - How to Make Unlimited Money Right Away as a Beginner (Paperback): Josef Gelp Beginner Forex Traders Money Making Guidebook - How to Make Unlimited Money Right Away as a Beginner (Paperback)
Josef Gelp
R488 Discovery Miles 4 880 Ships in 18 - 22 working days
Web Form Design - Filling in the Blanks (Paperback): Luke Wroblewski Web Form Design - Filling in the Blanks (Paperback)
Luke Wroblewski
R1,392 Discovery Miles 13 920 Ships in 18 - 22 working days
Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E... Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, Tokyo, Japan (Hardcover, 2008 ed.)
Makoto Oya, Ryuya Uda, Chizuko Yasunobu
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Deformation Theory of Discontinuous…
Ali Baklouti Hardcover R5,423 Discovery Miles 54 230
Data Analysis and Related Applications…
KN Zafeiris Hardcover R3,534 Discovery Miles 35 340
Differential Equations with…
Warren Wright, Dennis Zill Paperback  (1)
R1,339 R1,246 Discovery Miles 12 460
Applications of Supervised and…
Oleg Okun Hardcover R2,689 Discovery Miles 26 890
Rapid One-of-a-kind Product Development…
Shane (Shengquan) Xie, Yiliu Tu Hardcover R4,261 Discovery Miles 42 610
Warehouse Management - Automation and…
Michael Hompel, Thorsten Schmidt Hardcover R4,208 Discovery Miles 42 080
The Finite Element Method: Theory…
Mats G. Larson, Fredrik Bengzon Hardcover R2,691 Discovery Miles 26 910
Advanced Computer-Aided Fixture Design
Yiming (Kevin) Rong, Samuel Huang Hardcover R2,375 Discovery Miles 23 750
Designing Inclusive Interactions…
P. Langdon, P. John Clarkson, … Hardcover R5,161 Discovery Miles 51 610
Calculus - A Complete Course
Robert Adams, Christopher Essex Hardcover R2,018 Discovery Miles 20 180

 

Partners