0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (14)
  • R500+ (4,483)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

SDL 2011: Integrating System and Software Modeling - 15th International SDL Forum Toulouse, France, July 5-7, 2011. Revised... SDL 2011: Integrating System and Software Modeling - 15th International SDL Forum Toulouse, France, July 5-7, 2011. Revised Papers (Paperback, 2012)
Iulian Ober, Ileana Ober
R1,745 Discovery Miles 17 450 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International SDL Forum, SDL 2011, held in Toulouse, France, in July 2011. The 16 revised full papers presented together were carefully reviewed and selected for inclusion in the book. The papers cover a wide range of topics such as SDL and related languages; testing; and services and components to a wide range presentations of domain specific languages and applications, going from use maps to train station models or user interfaces for scientific dataset editors for high performance computing.

Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012,... Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings (Paperback, 2012 ed.)
Jens Grossklags, Jean Walrand
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.

High-Capacity Local and Metropolitan Area Networks - Architecture and Performance Issues (Paperback, Softcover reprint of the... High-Capacity Local and Metropolitan Area Networks - Architecture and Performance Issues (Paperback, Softcover reprint of the original 1st ed. 1991)
Guy Pujolle
R2,741 Discovery Miles 27 410 Ships in 18 - 22 working days

The main objective of this workshop was to review and discuss the state of the art and the latest advances* in the area of 1-10 Gbit/s throughput for local and metropolitan area networks. The first generation of local area networks had throughputs in the range 1-20 Mbit/s. Well-known examples of this first generation networks are the Ethernet and the Token Ring. The second generation of networks allowed throughputs in the range 100-200 Mbit/s. Representatives of this generation are the FDDI double ring and the DQDB (IEEE 802.6) networks. The third generation networks will have throughputs in the range 1-10 Gbit/s. The rapid development and deployment of fiber optics worldwide, as well as the projected emergence of a market for broadband services, have given rise to the development of broadband ISDN standards. Currently, the Asynchronous Transfer Mode (ATM) appears to be a viable solution to broadband networks. The possibility of all-optical networks in the future is being examined. This would allow the tapping of approximately 50 terahertz or so available in the lightwave range of the frequency spectrum. It is envisaged that using such a high-speed network it will be feasible to distribute high-quality video to the home, to carry out rapid retrieval of radiological and other scientific images, and to enable multi-media conferencing between various parties.

Multimedia Communications and Video Coding (Paperback, Softcover reprint of the original 1st ed. 1996): H.L. Bertoni, S.P. Kim,... Multimedia Communications and Video Coding (Paperback, Softcover reprint of the original 1st ed. 1996)
H.L. Bertoni, S.P. Kim, S. Panwar, Y. Wang
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Symposium on Multimedia Communications and Video Coding (ISMCVC95) held October 11 - 13, 1995, at the Poly technic University in Brooklyn, New York. This Symposium was organized under the aus pices of the New York State funded Center for Advanced Technology in Telecommunications (CATT), in cooperation with the Communications Society and the Signal Processing Society of the Institute of Electrical and Electronic Engineers (IEEE). In preparing this book, we have summarized the topics presented in various sessions of the Symposium, including the keynote addresses, the Service Provider and Vendor Session, the Panel Discussion, as well as the twelve Technical Sessions. This summary is presented in the Introduction. 'Full papers submitted by the presenters are organized into eleven chapters, divided into three parts. Part I focuses on systems issues in multimedia communications. Part II concentrates on video coding algorithms. Part III discusses the interplay between video coding and network control for video delivery over various channels."

Mobility Management in Wireless Networks - Data Replication Strategies and Applications (Paperback, Softcover reprint of the... Mobility Management in Wireless Networks - Data Replication Strategies and Applications (Paperback, Softcover reprint of the original 1st ed. 2004)
Karen Q. Tian, Donald C. Cox
R2,622 Discovery Miles 26 220 Ships in 18 - 22 working days

In wireless communication systems, the network keeps track of a user's location through an up-to-date user profile stored in various databases. A user profile contains not only a user's current location information, but also service information, such as billing and authentication. The cov- age area of an access network is divided into registration areas (RAs), and each RA is associated with a location database. The two basic op- ations in mobility management are location update and location lookup. When a user moves across the boundaries of these RAs, the network updates his location information in the pertinent databases. When a caller places a call using the callee's identification, the network queries the relevant database(s) to obtain the current location and other service information of the callee. The performance of mobility management can be further enhanced by using replicas of user profiles which may be kept at various locations. Replication techniques make profile information more readily available, thus reducing lookup cost and latency, but to keep these replicas c- sistent and fresh, they must be updated whenever the user profile is updated. The principle of replication is to replicate if the benefit of replication is greater than its overhead. The difficulty, however, lies in accurately measuring the benefit and overhead.

Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The... Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jaap-Henk Hoepman, Ingrid Verbauwhede
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.

Practical Intranet Security - Overview of the State of the Art and Available Technologies (Paperback, Softcover Repri): Paul M.... Practical Intranet Security - Overview of the State of the Art and Available Technologies (Paperback, Softcover Repri)
Paul M. Ashley, M. Vandenwauver
R5,137 Discovery Miles 51 370 Ships in 18 - 22 working days

Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, the new security architecture SESAME, which builds on the Kerberos authentication system, adding to it both public-key technology and a role-based access control service. Other technologies are also included such as a description of how to program with the GSS-API, and modern security technologies such as PGP, S/MIME, SSH, SSL IPSEC and CDSA. The book concludes with a comparison of the technologies. This book is different from other network security books in that its aim is to identify how to secure an organization's intranet. Previously books have concentrated on the Internet, often neglecting issues relating to securing intranets. However the potential risk to business and the ease by which intranets can be violated is often far greater than via the Internet. The aim is that network administrators and managers can get the information that they require to make informed choices on strategy and solutions for securing their own intranets. The book is an invaluable reference for network managers and network administrators whose responsibility it is to ensure the security of an organization's intranet. The book also contains background reading on networking, network security and cryptography which makes it an excellent research reference and undergraduate/postgraduate text book.

Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the... Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the original 1st ed. 2004)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R4,026 Discovery Miles 40 260 Ships in 18 - 22 working days

A research agenda for collaborative networks Purpose. Many practical application experiments and pilot cases nowadays provide evidence on what works and what still remains as a challenge for collaborative networked organizations (CNOs). The fast evolution of the information and communication technologies and in particular the so-called Internet technologies, also represents an important motivator for the emergence of new forms of collaboration. However, most efforts in this area are highly fragmented, considering only some partial facets and not a holistic perspective that would be required. We are therefore at a point in which it is necessary to define much more consolidated and sustainable research strategies for a second phase of research and development in this area. This book addresses the main disciplines involved in CNOs. It further synthesizes the views and opinions expressed by a large number of visionaries from the main disciplines involved in CNOs, and offers a comprehensive set of recommendations for the establishment of a research agenda on collaborative networks. As recognized experts in their specific areas, different authors in this book have presented work that is backed by a large number of research results, each focusing on specific facets of collaborative networks, and coming out of a large number of international and national projects.

Formal Methods and Software Engineering - 14th International Conference on Formal Engineering Methods, ICFEM 2012, Kyoto,... Formal Methods and Software Engineering - 14th International Conference on Formal Engineering Methods, ICFEM 2012, Kyoto, Japan, November 12-16, 2012, Proceedings (Paperback, 2012 ed.)
Toshiaki Aoki, Kenji Taguchi
R1,471 Discovery Miles 14 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Formal Engineering Methods, ICFEM 2012, held in Kyoto, Japan, November 2012. The 31 revised full papers together with 3 invited talks presented were carefully reviewed and selected from 85 submissions. The papers address all current issues in formal methods and their applications in software engineering. They are organized in topical sections on concurrency, applications of formal methods to new areas, quantity and probability, formal verification, modeling and development methodology, temporal logics, abstraction and refinement, tools, as well as testing and runtime verification.

Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November... Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings (Paperback, 2012)
Goichiro Hanaoka, Toshihiro Yamauchi
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.

Advances in Image and Video Technology - 5th Pacific Rim Symposium, PSIVT 2011, Gwangju, South Korea, November 20-23, 2011,... Advances in Image and Video Technology - 5th Pacific Rim Symposium, PSIVT 2011, Gwangju, South Korea, November 20-23, 2011, Proceedings, Part II (Paperback, 2011)
Yo-Sung Ho
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

The two-volume proceedings LNCS 7087 + 7088 constitute the proceedings of the 5th Pacific Rim Symposium, PSIVT 2011, held in Gwangju, Korea, in November 2011. The total of 71 revised papers was carefully reviewed and selected from 168 submissions. The topics covered are: image/video coding and transmission; image/video processing and analysis; imaging and graphics hardware and visualization; image/video retrieval and scene understanding; biomedical image processing and analysis; biometrics and image forensics; and computer vision applications.

On the Move to Meaningful Internet Systems: OTM 2011 - Confederated International Conferences, CoopIS, DOA-SVI, and ODBASE... On the Move to Meaningful Internet Systems: OTM 2011 - Confederated International Conferences, CoopIS, DOA-SVI, and ODBASE 2011, Hersonissos, Crete, Greece, October 17-21, 2011, Proceedings, Part II (Paperback)
Robert Meersman, Tharam Dillon, Pilar Herrero, Akhil Kumar, Manfred Reichert, …
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

The two-volume set LNCS 7044 and 7045 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2011), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2011), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2011) held as part of OTM 2011 in October 2011 in Hersonissos on the island of Crete, Greece. The 55 revised full papers presented were carefully reviewed and selected from a total of 141 submissions. The 28 papers included in the second volume constitute the proceedings of DOA-SVI 2011 with 15 full papers organized in topical sections on performance measurement and optimization, instrumentation, monitoring, and provisioning, quality of service, security and privacy, and models and methods, and ODBASE 2011 with 9 full papers organized in topical sections on acquisition of semantic information, use of semantic information, and reuse of semantic information and 4 short papers.

Contributions to a Computer-Based Theory of Strategies (Paperback, Softcover reprint of the original 1st ed. 1990): Nicholas V.... Contributions to a Computer-Based Theory of Strategies (Paperback, Softcover reprint of the original 1st ed. 1990)
Nicholas V. Findler
R1,409 Discovery Miles 14 090 Ships in 18 - 22 working days

People use the word strategy in a variety of different contexts. The term has connotations ranging from statesmanship to economic planning, and has become pervasive in the social sciences. We also talk about "problem solving strategies" and "corporate strategy" in a large business enterprise. The concept of strategy applies whenever a sequence of goal-oriented actions is based on large-scale and long-range planning. This monograph gives a systematic overview of the theory of strategies, a new area of enquiry developed over the past two decades by the author and his team. The projects described have clearly defined research objectives and are based on realistic assumptions about the environments in which the programming systems will work, and about the constraints and requirements they have to satisfy. Applications of the systems range over various aspects of air traffic control, automatic verification and validation of discrete-event simulation models, econometric model building, distributed planning systems for manufacturing, control of traffic lights, and others. The book is aimed at researchers, teachers and students in computer science, management science and certain areas of engineering. The reader should have some maturity in computer science and mathematics, and familiarity with the basic concepts of artificial intelligence.

Concurrency and Nets - Advances in Petri Nets (Paperback, Softcover reprint of the original 1st ed. 1987): Klaus Voss, Hartmann... Concurrency and Nets - Advances in Petri Nets (Paperback, Softcover reprint of the original 1st ed. 1987)
Klaus Voss, Hartmann J. Genrich, Grzegorz Rozenberg
R1,522 Discovery Miles 15 220 Ships in 18 - 22 working days

"Concurrency and Nets" is a special volume in the series "Advances in Petri Nets." Prepared as a tribute to Carl Adam Petri on the occasion of his 60th birthday, it is devoted to an outstanding personality and his pioneering and fruitful scientific work. Part I (70 pages of over 600) presents the congratulatory addresses and invited talks that were given at an Anniversary Colloquium. The contributions of this part honor Carl Adam Petri and his work from many different perspectives. Part II is a collection of invited papers discussing various aspects of the theme Concurrency and Nets. These papers are contributed partly by researchers that were or are still associated with the Petri Institute at GMD and partly by researchers whose scientific work deals with Net Theory or related system models. The topics range from basic theoretical aspects to application oriented methods.

802.11 Wireless Networks - Security and Analysis (Paperback, 2010 ed.): Alan Holt, Chi-Yu Huang 802.11 Wireless Networks - Security and Analysis (Paperback, 2010 ed.)
Alan Holt, Chi-Yu Huang
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book is about wireless local area networks (WLANs) based upon the IEEE 802.11 standards. It has three primary objectives: * To introduce the principles of 802.11 wireless networks and show how to con- ure equipment in order to implement various network solutions. * To provide an understandingof the security implicationsof wireless networks and demonstrate how vulnerabilities can be mitigated. * To introduce the underlying 802.11 protocols and build mathematical models in order to analyse performance in a WLAN environment. The book is aimed at industry professionals as well as undergraduate and gra- ate level students. It is intended as a companion for a university course on wireless networking. A practical approach is adopted in this book; examples are provided throughout, supported by detailed instructions. We cover a number of wireless vendors; namely, Cisco's Aironet, Alactel-Lucent's Omniaccess and Meru Networks. While separate vendors, all three systems have a Cisco IOS-like command-line interface. The GNU/Linux operating system is used extensively throughout this book.

The Essential PIC18 (R) Microcontroller (Paperback, 2010 ed.): Sid Katzen The Essential PIC18 (R) Microcontroller (Paperback, 2010 ed.)
Sid Katzen
R2,968 Discovery Miles 29 680 Ships in 18 - 22 working days

Microprocessors are the key component of the infrastructure of our 21st-century electronic- and digital information-based society. More than four billion are sold each year for use in 'intelligent' electronic devices; ranging from smart egg-timer through to aircraft management systems. Most of these processor devices appear in the form of highly-integrated microcontrollers, which comprize a core microprocessor together with memory and analog/digital peripheral ports. By using simple cores, these single-chip computers are the cost- and size-effective means of adding the brains to previous dumb widgets; such as the credit card. Using the same winning format as the successful Springer guide, The Quintessential PIC (R) Microcontroller, this down-to-earth new textbook/guide has been completely rewritten based on the more powerful PIC18 enhanced-range Microchip MCU family. Throughout the book, commercial hardware and software products are used to illustrate the material, as readers are provided real-world in-depth guidance on the design, construction and programming of small, embedded microcontroller-based systems. Suitable for stand-alone usage, the text does not require a prerequisite deep understanding of digital systems. Topics and features: uses an in-depth bottom-up approach to the topic of microcontroller design using the Microchip enhanced-range PIC18 (R) microcontroller family as the exemplar; includes fully worked examples and self-assessment questions, with additional support material available on an associated website; provides a standalone module on foundation topics in digital, logic and computer architecture for microcontroller engineering; discusses the hardware aspects of interfacing and interrupt handling, with an emphasis on the integration of hardware and software; covers parallel and serial input/output, timing, analog, and EEPROM data-handling techniques; presents a practical build-and-program case study, as well as illustrating simple testing strategies. This useful text/reference book will be of great value to industrial engineers, hobbyists and people in academia. Students of Electronic Engineering and Computer Science, at both undergraduate and postgraduate level, will also find this an ideal textbook, with many helpful learning tools. Dr. Sid Katzen is Associate to the School of Engineering, University of Ulster at Jordanstown, Northern Ireland.

Computer Applications for Bio-technology, Multimedia and Ubiquitous City - International Conferences, MulGraB, BSBT and IUrC... Computer Applications for Bio-technology, Multimedia and Ubiquitous City - International Conferences, MulGraB, BSBT and IUrC 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings (Paperback, 2012 ed.)
Tai-Hoon Kim, Jeong Jin Kang, William I. Grosky, Tughrul Arslan, Niki Pissinou
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the International Conferences, BSBT, MulGraB and IUrC 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Gangneung, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of multimedia, computer graphics and broadcasting, bio-science and bio-technology, and intelligent urban computing.

Protocol Test Systems VIII - Proceedings of the IFIP WG6.1 TC6 Eighth International Workshop on Protocol Test Systems,... Protocol Test Systems VIII - Proceedings of the IFIP WG6.1 TC6 Eighth International Workshop on Protocol Test Systems, September 1995 (Paperback, Softcover reprint of the original 1st ed. 1996)
Ana Cavalli, Stan Budkowski
R5,190 Discovery Miles 51 900 Ships in 18 - 22 working days

IWPTS'95 (International Workshop on Protocol Test Systems) is being held this year at !NT (Institut National des Telecommunications), Evry, France, from 4 to 6 September, 1995. IWPTS'95 is the eighth of a series of annual meetings sponsored by the IFIP Working Group WG6.1 dedicated to "Architecture and Protocols for Computer Networks". The seven previous workshops were held in Vancouver (Canada, 1988), Berlin (Germany, 1989), Mclean (USA, 1990), Leidschendam (The Netherlands, 1991), Montreal (Canada, 1992), Pau (France, 1993) and Tokyo (Japan, 1994). The workshop is a meeting place where both research and industry, theory and practice come together. By bringing both researchers and practitioners together, IWPTS opens up the communication between these groups. This helps keep the research vital and improves the state of the practitioner's art. Forty-eight papers have been submitted to IWPTS'95 and all of them have been reviewed by the members of the Program Committee and additional reviewers. The completed reviewers list is included in this Proceedings. Based on these reviews, the Program Committee selected 26 for oral presentation and 4 to be presented as posters. Two specially invited papers complete the Workshop Program, which is composed of ten sessions: Testing Methods (Session 1), Test Environments (Session 2), Theoretical Framework (Session 3), Algorithms and Languages (Session 4), Test Generation 1 (Session 5), Testability (Session 6), Test Generation 2 (Session 7), Industrial Applications (Session 8), Distributed Testing and performance (Session 9) and Test Management (Session 10).

Brains, Machines, and Mathematics (Paperback, 2nd ed. 1987. Softcover reprint of the original 2nd ed. 1987): Michael A Arbib Brains, Machines, and Mathematics (Paperback, 2nd ed. 1987. Softcover reprint of the original 2nd ed. 1987)
Michael A Arbib
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

This is a book whose time has come-again. The first edition (published by McGraw-Hill in 1964) was written in 1962, and it celebrated a number of approaches to developing an automata theory that could provide insights into the processing of information in brainlike machines, making it accessible to readers with no more than a college freshman's knowledge of mathematics. The book introduced many readers to aspects of cybernetics-the study of computation and control in animal and machine. But by the mid-1960s, many workers abandoned the integrated study of brains and machines to pursue artificial intelligence (AI) as an end in itself-the programming of computers to exhibit some aspects of human intelligence, but with the emphasis on achieving some benchmark of performance rather than on capturing the mechanisms by which humans were themselves intelligent. Some workers tried to use concepts from AI to model human cognition using computer programs, but were so dominated by the metaphor "the mind is a computer" that many argued that the mind must share with the computers of the 1960s the property of being serial, of executing a series of operations one at a time. As the 1960s became the 1970s, this trend continued. Meanwhile, experi mental neuroscience saw an exploration of new data on the anatomy and physiology of neural circuitry, but little of this research placed these circuits in the context of overall behavior, and little was informed by theoretical con cepts beyond feedback mechanisms and feature detectors."

Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings... Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings (Paperback, 2011)
Sushil Jajodia, Chandan Mazumdar
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Graph Drawing - 20th International Symposium, GD 2012, Redmond, WA, USA, September 19-21, 2012, Revised Selected Papers... Graph Drawing - 20th International Symposium, GD 2012, Redmond, WA, USA, September 19-21, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Walter Didimo, Maurizio Patrignani
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Symposium on Graph Drawing, GD 2012, held in Redmond, WA, USA, in September 2012. The 42 revised full papers presented together with 4 revised short papers and 8 poster descriptions were carefully reviewed and selected from 92 submissions. They cover a wide range of topics in two main tracks: combinatorial and algorithmic aspects, and visualization systems and interfaces. In addition, reports of the 19th Annual Graph Drawing Contest, which was held during the conference, and of a workshop on theory and practice of graph drawing to celebrate Professor Peter Eades' 60th birthday are included in the volume.

Databases in Networked Information Systems - 8th International Workshop, DNIS 2013, Aizu-Wakamatsu, Japan, March 25-27, 2013.... Databases in Networked Information Systems - 8th International Workshop, DNIS 2013, Aizu-Wakamatsu, Japan, March 25-27, 2013. Proceedings (Paperback, 2013 ed.)
Aastha Madaan, Shinji Kikuchi, Subhash Bhalla
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Databases in Networked Information Systems, DNIS 2013, held in Aizu-Wakamatsu, Japan in March 2013. The 22 revised full papers presented were carefully reviewed and selected for inclusion in the book. The workshop generally puts the main focus on data semantics and infrastructure for information management and interchange. The papers are organized in topical sections on cloud-based database systems; information and knowledge management; information extraction from data resources; bio-medical information management; and networked information systems: infrastructure.

Architecture of Computing Systems -- ARCS 2013 - 26th International Conference, Prague, Czech Republic, February 19-22, 2013... Architecture of Computing Systems -- ARCS 2013 - 26th International Conference, Prague, Czech Republic, February 19-22, 2013 Proceedings (Paperback, 2013 ed.)
Hana Kubatova, Christian Hochberger, Martin Danek, Bernhard Sick
R1,427 Discovery Miles 14 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th International Conference on Architecture of Computing Systems, ARCS 2013, held in Prague, Czech Republic, in February 2013. The 29 papers presented were carefully reviewed and selected from 73 submissions. The topics covered are computer architecture topics such as multi-cores, memory systems, and parallel computing, adaptive system architectures such as reconfigurable systems in hardware and software, customization and application specific accelerators in heterogeneous architectures, organic and autonomic computing including both theoretical and practical results on self-organization, self-configuration, self-optimization, self-healing, and self-protection techniques, operating systems including but not limited to scheduling, memory management, power management, RTOS, energy-awareness, and green computing.

Formal Modeling: Actors; Open Systems, Biological Systems - Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th... Formal Modeling: Actors; Open Systems, Biological Systems - Essays Dedicated to Carolyn Talcott on the Occasion of Her 70th Birthday (Paperback, 2011 ed.)
Gul Agha, Olivier Danvy, Jose Meseguer
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

This Festschrift volume, published in honor of Carolyn Talcott on the occasion of her 70th birthday, contains a collection of papers presented at a symposium held in Menlo Park, California, USA, in November 2011. Carolyn Talcott is a leading researcher and mentor of international renown among computer scientists. She has made key contributions to a number of areas of computer science including: semantics and verification of progamming languages; foundations of actor-based systems; middleware, meta-architectures, and systems; Maude and rewriting logic; and computational biology. The 21 papers presented are organized in topical sections named: Essays on Carolyn Talcott; actors and programming languages; cyberphysical systems; middleware and meta-architectures; formal methods and reasoning tools; and computational biology.

Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and... Intelligent Networks and Intelligence in Networks - IFIP TC6 WG6.7 International Conference on Intelligent Networks and Intelligence in Networks, 2-5 September 1997, Paris, France (Paperback, Softcover reprint of the original 1st ed. 1997)
Dominique Gaiti
R5,197 Discovery Miles 51 970 Ships in 18 - 22 working days

International Conference Intelligent Network and Intelligence in Networks (2IN97) French Ministry of Telecommunication, 20 Avenue de Segur, Paris -France September 2-5, 1997 Organizer: IFIP WG 6.7 -Intelligent Networks Sponsorship: IEEE, Alcatel, Ericsson, France Telecom, Nokia, Nordic Teleoperators, Siemens, Telecom Finland, Lab. PRiSM Aim of the conference To identify and study current issues related to the development of intelligent capabilities in networks. These issues include the development and distribution of services in broadband and mobile networks. This conference belongs to a series of IFIP conference on Intelligent Network. The first one took place in Lappeeranta August 94, the second one in Copenhagen, August 95. The proceedings of both events have been published by Chapman&Hall. IFIP Working Group 6.7 on IN has concentrated with the research and development of Intelligent Networks architectures. First the activities have concentrated in service creation, service management, database issues, feature interaction, IN performance and advanced signalling for broadband services. Later on the research activities have turned towards the distribution of intelligence in networks and IN applications to multimedia and mobility. The market issues of new services have also been studied. From the system development point of view, topics from OMG and TINA-C have been considered.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Contributions to Networked and…
Maria Guinaldo Losada Hardcover R3,597 R3,337 Discovery Miles 33 370
Connected Vehicles - Intelligent…
Radovan Miucic Hardcover R4,262 Discovery Miles 42 620
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan Hardcover R6,633 Discovery Miles 66 330
Cable Networks, Services, and Management
M Toy Hardcover R3,354 Discovery Miles 33 540
The Internet of Things in the Industrial…
Zaigham Mahmood Hardcover R4,001 Discovery Miles 40 010
Potential-Based Analysis of Social…
Seyed Rasoul Etesami Hardcover R3,554 R3,294 Discovery Miles 32 940
Distributed Real-Time Systems - Theory…
K. Erciyes Hardcover R2,132 Discovery Miles 21 320
Designing Networks for Innovation and…
Matthaus P. Zylka, Hauke Fuehres, … Hardcover R3,554 R3,294 Discovery Miles 32 940
Fault Tolerant Architectures for…
Sikhar Patranabis, Debdeep Mukhopadhyay Hardcover R3,802 Discovery Miles 38 020
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,507 R2,368 Discovery Miles 23 680

 

Partners