0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (19)
  • R500+ (4,472)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012,... Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings (Paperback, 2012 ed.)
Jens Grossklags, Jean Walrand
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.

New Network Architectures - The Path to the Future Internet (Paperback, 2010 ed.): Tania Tronco New Network Architectures - The Path to the Future Internet (Paperback, 2010 ed.)
Tania Tronco
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

"Future Internet" is a worldwide hot topic. The Internet has become a critical infrastructure for business development and social interactions. However, the immense growth of the Internet has resulted in additional stresses on its architecture, resulting in a network difficult to monitor, understand, and manage due to its huge scale in terms of connected devices and actors (end users, content providers, equipment vendors, etc). This book presents and discusses the ongoing initiatives and experimental facilities for the creation of new Future Internet Architectures using alternative approaches like Clean Slate and Incremental improvements: It considers several possible internet network use scenarios that include seamless mobility, ad hoc networks, sensor networks, internet of things and new paradigms like content and user centric networks.

Multimedia Communications and Video Coding (Paperback, Softcover reprint of the original 1st ed. 1996): H.L. Bertoni, S.P. Kim,... Multimedia Communications and Video Coding (Paperback, Softcover reprint of the original 1st ed. 1996)
H.L. Bertoni, S.P. Kim, S. Panwar, Y. Wang
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Symposium on Multimedia Communications and Video Coding (ISMCVC95) held October 11 - 13, 1995, at the Poly technic University in Brooklyn, New York. This Symposium was organized under the aus pices of the New York State funded Center for Advanced Technology in Telecommunications (CATT), in cooperation with the Communications Society and the Signal Processing Society of the Institute of Electrical and Electronic Engineers (IEEE). In preparing this book, we have summarized the topics presented in various sessions of the Symposium, including the keynote addresses, the Service Provider and Vendor Session, the Panel Discussion, as well as the twelve Technical Sessions. This summary is presented in the Introduction. 'Full papers submitted by the presenters are organized into eleven chapters, divided into three parts. Part I focuses on systems issues in multimedia communications. Part II concentrates on video coding algorithms. Part III discusses the interplay between video coding and network control for video delivery over various channels."

Mobility Management in Wireless Networks - Data Replication Strategies and Applications (Paperback, Softcover reprint of the... Mobility Management in Wireless Networks - Data Replication Strategies and Applications (Paperback, Softcover reprint of the original 1st ed. 2004)
Karen Q. Tian, Donald C. Cox
R2,622 Discovery Miles 26 220 Ships in 18 - 22 working days

In wireless communication systems, the network keeps track of a user's location through an up-to-date user profile stored in various databases. A user profile contains not only a user's current location information, but also service information, such as billing and authentication. The cov- age area of an access network is divided into registration areas (RAs), and each RA is associated with a location database. The two basic op- ations in mobility management are location update and location lookup. When a user moves across the boundaries of these RAs, the network updates his location information in the pertinent databases. When a caller places a call using the callee's identification, the network queries the relevant database(s) to obtain the current location and other service information of the callee. The performance of mobility management can be further enhanced by using replicas of user profiles which may be kept at various locations. Replication techniques make profile information more readily available, thus reducing lookup cost and latency, but to keep these replicas c- sistent and fresh, they must be updated whenever the user profile is updated. The principle of replication is to replicate if the benefit of replication is greater than its overhead. The difficulty, however, lies in accurately measuring the benefit and overhead.

Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the... Collaborative Networked Organizations - A research agenda for emerging business models (Paperback, Softcover reprint of the original 1st ed. 2004)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R4,026 Discovery Miles 40 260 Ships in 18 - 22 working days

A research agenda for collaborative networks Purpose. Many practical application experiments and pilot cases nowadays provide evidence on what works and what still remains as a challenge for collaborative networked organizations (CNOs). The fast evolution of the information and communication technologies and in particular the so-called Internet technologies, also represents an important motivator for the emergence of new forms of collaboration. However, most efforts in this area are highly fragmented, considering only some partial facets and not a holistic perspective that would be required. We are therefore at a point in which it is necessary to define much more consolidated and sustainable research strategies for a second phase of research and development in this area. This book addresses the main disciplines involved in CNOs. It further synthesizes the views and opinions expressed by a large number of visionaries from the main disciplines involved in CNOs, and offers a comprehensive set of recommendations for the establishment of a research agenda on collaborative networks. As recognized experts in their specific areas, different authors in this book have presented work that is backed by a large number of research results, each focusing on specific facets of collaborative networks, and coming out of a large number of international and national projects.

Advances in Image and Video Technology - 5th Pacific Rim Symposium, PSIVT 2011, Gwangju, South Korea, November 20-23, 2011,... Advances in Image and Video Technology - 5th Pacific Rim Symposium, PSIVT 2011, Gwangju, South Korea, November 20-23, 2011, Proceedings, Part II (Paperback, 2011)
Yo-Sung Ho
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

The two-volume proceedings LNCS 7087 + 7088 constitute the proceedings of the 5th Pacific Rim Symposium, PSIVT 2011, held in Gwangju, Korea, in November 2011. The total of 71 revised papers was carefully reviewed and selected from 168 submissions. The topics covered are: image/video coding and transmission; image/video processing and analysis; imaging and graphics hardware and visualization; image/video retrieval and scene understanding; biomedical image processing and analysis; biometrics and image forensics; and computer vision applications.

Advances in Image and Video Technology - 5th Pacific Rim Symposium, PSIVT 2011, Gwangju, South Korea, November 20-23, 2011,... Advances in Image and Video Technology - 5th Pacific Rim Symposium, PSIVT 2011, Gwangju, South Korea, November 20-23, 2011, Proceedings, Part I (Paperback, 2011)
Yo-Sung Ho
R1,448 Discovery Miles 14 480 Ships in 18 - 22 working days

The two-volume proceedings LNCS 7087 + LNCS 7088 constitute the proceedings of the 5th Pacific Rim Symposium on Image and Video Technology, PSIVT 2011, held in Gwangju, Korea, in November 2011. The total of 71 revised papers was carefully reviewed and selected from 168 submissions. The topics covered are: image/video coding and transmission; image/video processing and analysis; imaging and graphics hardware and visualization; image/video retrieval and scene understanding; biomedical image processing and analysis; biometrics and image forensics; and computer vision applications.

On the Move to Meaningful Internet Systems: OTM 2011 - Confederated International Conferences, CoopIS, DOA-SVI, and ODBASE... On the Move to Meaningful Internet Systems: OTM 2011 - Confederated International Conferences, CoopIS, DOA-SVI, and ODBASE 2011, Hersonissos, Crete, Greece, October 17-21, 2011, Proceedings, Part II (Paperback)
Robert Meersman, Tharam Dillon, Pilar Herrero, Akhil Kumar, Manfred Reichert, …
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

The two-volume set LNCS 7044 and 7045 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2011), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2011), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2011) held as part of OTM 2011 in October 2011 in Hersonissos on the island of Crete, Greece. The 55 revised full papers presented were carefully reviewed and selected from a total of 141 submissions. The 28 papers included in the second volume constitute the proceedings of DOA-SVI 2011 with 15 full papers organized in topical sections on performance measurement and optimization, instrumentation, monitoring, and provisioning, quality of service, security and privacy, and models and methods, and ODBASE 2011 with 9 full papers organized in topical sections on acquisition of semantic information, use of semantic information, and reuse of semantic information and 4 short papers.

On the Move to Meaningful Internet Systems: OTM 2011 Workshops - Confederated International Workshops and Posters, EI2N+NSF... On the Move to Meaningful Internet Systems: OTM 2011 Workshops - Confederated International Workshops and Posters, EI2N+NSF ICE, ICSP+INBAST, ISDE, ORM, OTMA, SWWS+MONET+SeDeS, and VADER 2011, Hersonissos, Crete, Greece, October 17-21, 2011, Proceedings (Paperback)
Robert Meersman, Tharam Dillon, Pilar Herrero
R1,537 Discovery Miles 15 370 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of nine international workshops, EI2N+NSF ICE, ICSP, INBAST, ISDE, MONET, ORM, SeDeS, SWWS, and VADER 2011, held as part of OTM 2011 in Hersonissos on the island of Crete, Greece, in October 2011. The 64 revised full papers presented were carefully reviewed and selected from a total of 104 submissions. The volume also includes three papers from the On the Move Academy (OTMA) 2011 and five ODBASE 2011 poster papers. Topics of the workshop papers are enterprise integration and semantics, information centric engineering, interoperability, industrial and business applications of semantic Web applications, information systems in distributed environments, process management in distributed information system development, distributed information systems: implementation issues and applications, industrial applications of fact-oriented modeling, data warehouse modeling, extensions to fact-oriented modeling, model validation procedures, schema transformations and mapping, semantic Web and Web semantics, ontology development, deployment and interoperability, data access and efficient computation, efficient information processing, exchange and knowledge synthesis algorithms, mobile and networking technologies for social applications, semantic and decision support, variability in software architecture, and dynamic and adaptive architectures.

Computer Supported Collaborative Learning (Paperback, Softcover reprint of the original 1st ed. 1995): Claire O'Malley Computer Supported Collaborative Learning (Paperback, Softcover reprint of the original 1st ed. 1995)
Claire O'Malley
R2,660 Discovery Miles 26 600 Ships in 18 - 22 working days

Although research in collaborative learning has a fairly long history, dating back at least to the early work of Piaget and Vygotsky, it is only recently that workers have begun to apply some of its findings to the design of computer based learning systems. The early generation of the le systems focused on their potential for supporting individual learning: learning could be self paced; teaching could be adapted to individual learners' needs. This was certainly the promise of the later generation of intelligent tutoring systems. However, this promise has yet to be realised. Not only are there still some very difficult research problems to solve in providing adaptive learning systems, but there are also some very real practical constraints on the widespread take up of individualised computer based instruction. Reseachers soon began to realise that the organisational, cultural and social contexts of the classroom have to be taken into account in designing systems to promote effective learning. Much of the work that goes on in classrooms is collaborative, whether by design or not. Teachers also need to be able to adapt the technology to their varying needs. Developments in technology, such as networking, have also contributed to changes in the way in which computers may be envisaged to support learning. In September 1989, a group of researchers met in Maratea, Italy, for a NATO-sponsored workshop on "Computer supported collaborative . learning." A total of 20 researchers from Europe (Belgium."

Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November... Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings (Paperback, 2012)
Goichiro Hanaoka, Toshihiro Yamauchi
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in Fukuoka, Japan, in November 2012. The 16 revised selected papers presented in this volume were carefully reviewed and selected from 53 submissions. They are organized in topical sections named: implementation; encryption and key exchange; cryptanalysis; and secure protocols.

Formal Methods and Software Engineering - 14th International Conference on Formal Engineering Methods, ICFEM 2012, Kyoto,... Formal Methods and Software Engineering - 14th International Conference on Formal Engineering Methods, ICFEM 2012, Kyoto, Japan, November 12-16, 2012, Proceedings (Paperback, 2012 ed.)
Toshiaki Aoki, Kenji Taguchi
R1,471 Discovery Miles 14 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Formal Engineering Methods, ICFEM 2012, held in Kyoto, Japan, November 2012. The 31 revised full papers together with 3 invited talks presented were carefully reviewed and selected from 85 submissions. The papers address all current issues in formal methods and their applications in software engineering. They are organized in topical sections on concurrency, applications of formal methods to new areas, quantity and probability, formal verification, modeling and development methodology, temporal logics, abstraction and refinement, tools, as well as testing and runtime verification.

Informatics Engineering and Information Science, Part IV - International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia,... Informatics Engineering and Information Science, Part IV - International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part IV (Paperback, 2011)
Azizah Abd Manaf, Shamsul Sahibuddin, Rabiah Ahmad, Salwani Mohd Daud, Eyas El-Qawasmeh
R2,715 Discovery Miles 27 150 Ships in 18 - 22 working days

This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.

Informatics Engineering and Information Science, Part III - International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia,... Informatics Engineering and Information Science, Part III - International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part III (Paperback, 2011)
Azizah Abd Manaf, Shamsul Sahibuddin, Rabiah Ahmad, Salwani Mohd Daud, Eyas El-Qawasmeh
R2,775 Discovery Miles 27 750 Ships in 18 - 22 working days

This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed proceedings of the International Conference on Informatics Engineering and Information Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information security, software engineering, image processing, algorithms, artificial intelligence and soft computing, e-commerce, data mining, neural networks, social networks, grid computing, biometric technologies, networks, distributed and parallel computing, wireless networks, information and data management, web applications and software systems, multimedia, ad hoc networks, mobile computing, as well as miscellaneous topics in digital information and communications.

Intermittently Connected Mobile Ad Hoc Networks - from Routing to Content Distribution (Paperback, 2011): Abbas Jamalipour,... Intermittently Connected Mobile Ad Hoc Networks - from Routing to Content Distribution (Paperback, 2011)
Abbas Jamalipour, Yaozhou Ma
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users' behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths between every pair of nodes. For the conventional MANETs, mobility of nodes is considered as a challenge and needs to be handled properly to enable seamless communication between nodes. However, to overcome intermittent connectivity in the ICMANs context, mobility is recognized as a critical component for data communications between the nodes that may never be part of the same connected portion of the network. This comes at the cost of addition considerable delay in data forwarding, since data are often stored and carried by the intermediate nodes waiting for the mobility to generate the next forwarding opportunity that can probably bring it close to the destination. Such incurred large delays primarily limit ICMANs to the applications, which must tolerate delays beyond traditional forwarding delays. ICMANs belong to the family of delay tolerant networks (DTNs). However, the unique characteristics (e.g., self-organizing, random mobility and ad hoc based connection) derived from MANETs distinguish ICMANs from other typical DTNs such as interplanetary network (IPN) with infrastructure-based architecture. By allowing mobile nodes to connect and disconnect based on their behaviors and wills, ICMANs enable a number of novel applications to become possible in the field of MANETs. For example, there is a growing demand for efficient architectures for deploying opportunistic content distribution systems over ICMANs. This is because a large number of smart handheld devices with powerful functions enable mobile users to utilize low cost wireless connectivities such as Bluetooth and IEEE 802.11 for sharing and exchanging the multimedia contents anytime anywhere. Note that such phenomenal growth of content-rich services has promoted a new kind of networking where the content is delivered from its source (referred to as publisher) towards interested users (referred to as subscribers) rather than towards the pre-specified destinations. Compared to the extensive research activities relating to the routing and forwarding issues in ICMANs and even DTNs, opportunistic content distribution is just in its early stage and has not been widely addressed. With all these in mind, this book provides an in-depth discussion on the latest research efforts for opportunistic content distribution over ICMANs.

Flow Control of Congested Networks (Paperback, Softcover reprint of the original 1st ed. 1987): Amedeo R Odoni, Lucio Bianco,... Flow Control of Congested Networks (Paperback, Softcover reprint of the original 1st ed. 1987)
Amedeo R Odoni, Lucio Bianco, Giorgio Szegoe
R1,443 Discovery Miles 14 430 Ships in 18 - 22 working days

This volume is a compendium of papers presented during the NATO Workshop which took place in Capri, Italy, October 12-18, 1986 on the general subject of "Flow Control of Congested Networks: The Case of Data Processing and Transportation," and of which we acted as co-chairmen. The focus of the workshop was on flow control methodologies, as applied to preventing or reducing congestion on: (1) data communication networks; (2) urban transportation networks; and (3) air traffic control systems. The goals of the workshop included: review of the state-of-the-art of flow control methodologies, in general, and in each of the three application areas; identification of similarities and differences in the objective functions, modeling approaches and mathematics used in the three areas; examination of opportunities for "technology transfers" and for future interactions among researchers in the three areaso These goals were pursued through individual presentations of papers on current research by workshop participants and, in the cases of the second and third goals, through a number of open-ended discussion and-review sessions which were interspersed throughout the workshop's programmeD The full texts or extended summaries of all but a few of the papers given at the workshop are included in this volume."

802.11 Wireless Networks - Security and Analysis (Paperback, 2010 ed.): Alan Holt, Chi-Yu Huang 802.11 Wireless Networks - Security and Analysis (Paperback, 2010 ed.)
Alan Holt, Chi-Yu Huang
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book is about wireless local area networks (WLANs) based upon the IEEE 802.11 standards. It has three primary objectives: * To introduce the principles of 802.11 wireless networks and show how to con- ure equipment in order to implement various network solutions. * To provide an understandingof the security implicationsof wireless networks and demonstrate how vulnerabilities can be mitigated. * To introduce the underlying 802.11 protocols and build mathematical models in order to analyse performance in a WLAN environment. The book is aimed at industry professionals as well as undergraduate and gra- ate level students. It is intended as a companion for a university course on wireless networking. A practical approach is adopted in this book; examples are provided throughout, supported by detailed instructions. We cover a number of wireless vendors; namely, Cisco's Aironet, Alactel-Lucent's Omniaccess and Meru Networks. While separate vendors, all three systems have a Cisco IOS-like command-line interface. The GNU/Linux operating system is used extensively throughout this book.

The Essential PIC18 (R) Microcontroller (Paperback, 2010 ed.): Sid Katzen The Essential PIC18 (R) Microcontroller (Paperback, 2010 ed.)
Sid Katzen
R2,968 Discovery Miles 29 680 Ships in 18 - 22 working days

Microprocessors are the key component of the infrastructure of our 21st-century electronic- and digital information-based society. More than four billion are sold each year for use in 'intelligent' electronic devices; ranging from smart egg-timer through to aircraft management systems. Most of these processor devices appear in the form of highly-integrated microcontrollers, which comprize a core microprocessor together with memory and analog/digital peripheral ports. By using simple cores, these single-chip computers are the cost- and size-effective means of adding the brains to previous dumb widgets; such as the credit card. Using the same winning format as the successful Springer guide, The Quintessential PIC (R) Microcontroller, this down-to-earth new textbook/guide has been completely rewritten based on the more powerful PIC18 enhanced-range Microchip MCU family. Throughout the book, commercial hardware and software products are used to illustrate the material, as readers are provided real-world in-depth guidance on the design, construction and programming of small, embedded microcontroller-based systems. Suitable for stand-alone usage, the text does not require a prerequisite deep understanding of digital systems. Topics and features: uses an in-depth bottom-up approach to the topic of microcontroller design using the Microchip enhanced-range PIC18 (R) microcontroller family as the exemplar; includes fully worked examples and self-assessment questions, with additional support material available on an associated website; provides a standalone module on foundation topics in digital, logic and computer architecture for microcontroller engineering; discusses the hardware aspects of interfacing and interrupt handling, with an emphasis on the integration of hardware and software; covers parallel and serial input/output, timing, analog, and EEPROM data-handling techniques; presents a practical build-and-program case study, as well as illustrating simple testing strategies. This useful text/reference book will be of great value to industrial engineers, hobbyists and people in academia. Students of Electronic Engineering and Computer Science, at both undergraduate and postgraduate level, will also find this an ideal textbook, with many helpful learning tools. Dr. Sid Katzen is Associate to the School of Engineering, University of Ulster at Jordanstown, Northern Ireland.

Computational Intelligence and Information Technology - First International Conference, CIIT 2011, Pune, India, November 7-8,... Computational Intelligence and Information Technology - First International Conference, CIIT 2011, Pune, India, November 7-8, 2011. Proceedings (Paperback, 2012)
Vinu V. Das, Nessy Thankachan
R2,817 Discovery Miles 28 170 Ships in 18 - 22 working days

This book constitutes the proceedings of the First International Conference on Computational Intelligence and Information Technology, CIIT 2011, held in Pune, India, in November 2011. The 58 revised full papers, 67 revised short papers, and 32 poster papers presented were carefully reviewed and selected from 483 initial submissions. The papers are contributed by innovative academics and industrial experts in the field of computer science, information technology, computational engineering, mobile communication and security and offer a stage to a common forum, where a constructive dialog on theoretical concepts, practical ideas and results of the state of the art can be developed.

Information Infrastructure Systems for Manufacturing - Proceedings of the IFIP TC5/WG5.3/WG5.7 international conference on the... Information Infrastructure Systems for Manufacturing - Proceedings of the IFIP TC5/WG5.3/WG5.7 international conference on the Design of Information Infrastructure Systems for Manufacturing, DIISM '96 Eindhoven, the Netherlands, 15-18 September 1996 (Paperback, Softcover reprint of the original 1st ed. 1997)
Jan Goossenaerts, Johan C. Wortmann, Fumihiko Kimura
R4,060 Discovery Miles 40 600 Ships in 18 - 22 working days

On the verge of the global information society, enterprises are competing for markets that are becoming global and driven by customer demand, and where growing specialisation is pushing them to focus on core competencies and look for partnerships to provide products and services. Simultaneously the public demands environmentally sustainable industries and urges manufacturers to mind the whole life span of their products and production resources. Information infrastructure systems are anticipated to offer services enabling and catalyzing the strategies of manufacturing companies responding to these challenges: they support the formation of extended enterprises, the mastering of full product and process life cycles, and the digitalization of the development process. Information infrastructure systems would accommodate access to and transformation of information as required by the various authorized stakeholders involved in the life phases of products or production resources. Services should be available to select and present all relevant information for situations involving any kind of players, during any life phase of a product or artifact, at any moment and at any place.

Protocol Test Systems VIII - Proceedings of the IFIP WG6.1 TC6 Eighth International Workshop on Protocol Test Systems,... Protocol Test Systems VIII - Proceedings of the IFIP WG6.1 TC6 Eighth International Workshop on Protocol Test Systems, September 1995 (Paperback, Softcover reprint of the original 1st ed. 1996)
Ana Cavalli, Stan Budkowski
R5,190 Discovery Miles 51 900 Ships in 18 - 22 working days

IWPTS'95 (International Workshop on Protocol Test Systems) is being held this year at !NT (Institut National des Telecommunications), Evry, France, from 4 to 6 September, 1995. IWPTS'95 is the eighth of a series of annual meetings sponsored by the IFIP Working Group WG6.1 dedicated to "Architecture and Protocols for Computer Networks". The seven previous workshops were held in Vancouver (Canada, 1988), Berlin (Germany, 1989), Mclean (USA, 1990), Leidschendam (The Netherlands, 1991), Montreal (Canada, 1992), Pau (France, 1993) and Tokyo (Japan, 1994). The workshop is a meeting place where both research and industry, theory and practice come together. By bringing both researchers and practitioners together, IWPTS opens up the communication between these groups. This helps keep the research vital and improves the state of the practitioner's art. Forty-eight papers have been submitted to IWPTS'95 and all of them have been reviewed by the members of the Program Committee and additional reviewers. The completed reviewers list is included in this Proceedings. Based on these reviews, the Program Committee selected 26 for oral presentation and 4 to be presented as posters. Two specially invited papers complete the Workshop Program, which is composed of ten sessions: Testing Methods (Session 1), Test Environments (Session 2), Theoretical Framework (Session 3), Algorithms and Languages (Session 4), Test Generation 1 (Session 5), Testability (Session 6), Test Generation 2 (Session 7), Industrial Applications (Session 8), Distributed Testing and performance (Session 9) and Test Management (Session 10).

Brains, Machines, and Mathematics (Paperback, 2nd ed. 1987. Softcover reprint of the original 2nd ed. 1987): Michael A Arbib Brains, Machines, and Mathematics (Paperback, 2nd ed. 1987. Softcover reprint of the original 2nd ed. 1987)
Michael A Arbib
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

This is a book whose time has come-again. The first edition (published by McGraw-Hill in 1964) was written in 1962, and it celebrated a number of approaches to developing an automata theory that could provide insights into the processing of information in brainlike machines, making it accessible to readers with no more than a college freshman's knowledge of mathematics. The book introduced many readers to aspects of cybernetics-the study of computation and control in animal and machine. But by the mid-1960s, many workers abandoned the integrated study of brains and machines to pursue artificial intelligence (AI) as an end in itself-the programming of computers to exhibit some aspects of human intelligence, but with the emphasis on achieving some benchmark of performance rather than on capturing the mechanisms by which humans were themselves intelligent. Some workers tried to use concepts from AI to model human cognition using computer programs, but were so dominated by the metaphor "the mind is a computer" that many argued that the mind must share with the computers of the 1960s the property of being serial, of executing a series of operations one at a time. As the 1960s became the 1970s, this trend continued. Meanwhile, experi mental neuroscience saw an exploration of new data on the anatomy and physiology of neural circuitry, but little of this research placed these circuits in the context of overall behavior, and little was informed by theoretical con cepts beyond feedback mechanisms and feature detectors."

Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings... Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings (Paperback, 2011)
Sushil Jajodia, Chandan Mazumdar
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Graph Drawing - 20th International Symposium, GD 2012, Redmond, WA, USA, September 19-21, 2012, Revised Selected Papers... Graph Drawing - 20th International Symposium, GD 2012, Redmond, WA, USA, September 19-21, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Walter Didimo, Maurizio Patrignani
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Symposium on Graph Drawing, GD 2012, held in Redmond, WA, USA, in September 2012. The 42 revised full papers presented together with 4 revised short papers and 8 poster descriptions were carefully reviewed and selected from 92 submissions. They cover a wide range of topics in two main tracks: combinatorial and algorithmic aspects, and visualization systems and interfaces. In addition, reports of the 19th Annual Graph Drawing Contest, which was held during the conference, and of a workshop on theory and practice of graph drawing to celebrate Professor Peter Eades' 60th birthday are included in the volume.

Algorithmic Decision Theory - Second International Conference, ADT 2011, Piscataway, NJ, USA, October 26-28, 2011. Proceedings... Algorithmic Decision Theory - Second International Conference, ADT 2011, Piscataway, NJ, USA, October 26-28, 2011. Proceedings (Paperback, 2011)
Ronen Brafman, Fred S. Roberts, Alexis Tsoukias
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Algorithmic Decision Theory, ADT 2011, held in Piscataway, NJ, USA, in October 2011. The 24 revised full papers presented were carefully reviewed and selected from 50 submissions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Spanish Language of New Mexico and…
G.D. Bills, Neddy A. Vigil Hardcover R2,453 Discovery Miles 24 530
Do You Make These Mistakes in English…
Edwin L. Basttistella Hardcover R1,179 Discovery Miles 11 790
Ten Lectures on Diachronic Construction…
Martin Hilpert Hardcover R3,513 Discovery Miles 35 130
A Comparative Grammar of Borgomanerese
Christina Tortora Hardcover R3,858 Discovery Miles 38 580
Most Probably - Epistemic Modality in…
Nathan Wasserman Hardcover R1,636 Discovery Miles 16 360
Vowel Length From Latin to Romance
Michele Loporcaro Hardcover R3,140 Discovery Miles 31 400
RLE: Japan Mini-Set E: Sociology…
Various Hardcover R47,733 Discovery Miles 477 330
The Linguistic Cycle - Language Change…
Elly van Gelderen Hardcover R1,932 Discovery Miles 19 320
The History of Languages - An…
Tore Janson Hardcover R3,179 Discovery Miles 31 790
Language and Language-in-Education…
R. B Kaplan, Richard B. Baldauf Jr Hardcover R2,691 Discovery Miles 26 910

 

Partners