0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (15)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Digital Enterprise and Information Systems - International Conference, DEIS 2011, London, UK July 20 - 22, 2011, Proceedings... Digital Enterprise and Information Systems - International Conference, DEIS 2011, London, UK July 20 - 22, 2011, Proceedings (Paperback, 2011 ed.)
Ezendu Ariwa, Eyas El-Qawasmeh
R2,805 Discovery Miles 28 050 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the International Conference on Digital Enterprise and Information Systems, held in London during July 20 - 22, 2011. The 70 revised full papers presented were carefully reviewed and selected. They are organized in topical sections on cryptography and data protection, embedded systems and software, information technology management, e-business applications and software, critical computing and storage, distributed and parallel applications, digital management products, image processing, digital enterprises, XML-based languages, digital libraries, and data mining.

Multimedia Communications, Services and Security - 5th International Conference, MCSS 2012, Krakow, Poland, May 31--June 1,... Multimedia Communications, Services and Security - 5th International Conference, MCSS 2012, Krakow, Poland, May 31--June 1, 2012. Proceedings (Paperback, 2012)
Andrzej Dziech, Andrzej Czyzewski
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Multimedia Communications, Services and Security, MCSS 2012, held in Krakow, Poland, in May/June 2012. The 37 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address issues such as privacy and data protection using digital watermarking and other technologies; object and threat detection; data protection and distribution; human-centric multimedia analysis and synthesis; cybercrime detection and counteracting.

Modeling Decision for Artificial Intelligence - 8th International Conference, MDAI 2011, Changsha, Hunan, China, July 28-30,... Modeling Decision for Artificial Intelligence - 8th International Conference, MDAI 2011, Changsha, Hunan, China, July 28-30, 2011, Proceedings (Paperback, Edition.)
Vicenc Torra, Yasuo Narukawa, Jianping Yin, Jun Long
R1,741 Discovery Miles 17 410 Ships in 18 - 22 working days

This book constitutes the proceedings of the 8th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2011, held in Changsha, China, in July 2011. The 25 papers presented were carefully reviewed and selected from 43 submissions. The volume also contains extended abstracts of the three invited papers. The topics covered are aggregation operators and decision making; clustering and similarity; computational intelligence; and data privacy.

Database and Expert Systems Applications - 22nd International Conference, DEXA 2011, Toulouse, France, August 29 - September 2,... Database and Expert Systems Applications - 22nd International Conference, DEXA 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings, Part I (Paperback, 2011)
Abdelkader Hameurlain, Stephen W. Liddle, Klaus-Dieter Schewe, Xiaofang Zhou
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 22 International Conference on Database and Expert Systems Applications, DEXA 2011, held in Toulouse, France, August 29 - September 2, 2011. The 52 revised full papers and 40 short papers presented were carefully reviewed and selected from 207 submissions. The papers are organized in topical sections on query processing; database semantics; skyline queries; security and privacy; spatial and temporal data; semantic web search; storage and search; web search; data integration, transactions and optimization; and web applications.

Principles of Distributed Systems - 16th International Conference, OPODIS 2012, Rome, Italy, December 18-20, 2012, Proceedings... Principles of Distributed Systems - 16th International Conference, OPODIS 2012, Rome, Italy, December 18-20, 2012, Proceedings (Paperback, 2012 ed.)
Roberto Baldoni, Paola Flocchini, Ravindran Binoy
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th International Conference on Principles of Distributed Systems, OPODIS 2012, held in Rome, Italy, in December 2012. The 24 papers presented were carefully reviewed and selected from 89 submissions. The conference is an international forum for the exchange of state-of-the-art knowledge on distributed computing and systems. Papers were sought soliciting original research contributions to the theory, specification, design and implementation of distributed systems.

Virtual Computing - Concept, Design, and Evaluation (Paperback, Softcover reprint of the original 1st ed. 2001): Dongmin Kim,... Virtual Computing - Concept, Design, and Evaluation (Paperback, Softcover reprint of the original 1st ed. 2001)
Dongmin Kim, Salim Hariri
R2,614 Discovery Miles 26 140 Ships in 18 - 22 working days

The evolution of modern computers began more than 50 years ago and has been driven to a large extend by rapid advances in electronic technology during that period. The first computers ran one application (user) at a time. Without the benefit of operating systems or compilers, the application programmers were responsible for managing all aspects of the hardware. The introduction of compilers allowed programmers to express algorithms in abstract terms without being concerned with the bit level details of their implementation. Time sharing operating systems took computing systems one step further and allowed several users and/or applications to time share the computing services of com puters. With the advances of networks and software tools, users and applications were able to time share the logical and physical services that are geographically dispersed across one or more networks. Virtual Computing (VC) concept aims at providing ubiquitous open computing services in analogous way to the services offered by Telephone and Elec trical (utility) companies. The VC environment should be dynamically setup to meet the requirements of a single user and/or application. The design and development of a dynamically programmable virtual comput ing environments is a challenging research problem. However, the recent advances in processing and network technology and software tools have successfully solved many of the obstacles facing the wide deployment of virtual computing environments as will be outlined next."

Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected... Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers (Paperback)
Antoine Joux
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

Terminological Ontologies - Design, Management and Practical Applications (Paperback, 2010 ed.): Javier Lacasta, Javier... Terminological Ontologies - Design, Management and Practical Applications (Paperback, 2010 ed.)
Javier Lacasta, Javier Nogueras-Iso, Francisco Javier Zarazaga-Soria
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Information infrastructures are integrated solutions based on the fusion of information and communication technologies. They are characterized by the large amount of data that must be managed accordingly. An information infrastructure requires an efficient and effective information retrieval system to provide access to the items stored in the infrastructure. Terminological Ontologies: Design, Management and Practical Applications presents the main problems that affect the discovery systems of information infrastructures to manage terminological models, and introduces a combination of research tools and applications in Semantic Web technologies. This book specifically analyzes the need to create, relate, and integrate the models required for an infrastructure by elaborating on the problem of accessing these models in an efficient manner via interoperable services and components.

Terminological Ontologies: Design, Management and Practical Applications is geared toward information management systems and semantic web professionals working as project managers, application developers, government workers and more. Advanced undergraduate and graduate level students, professors and researchers focusing on computer science will also find this book valuable as a secondary text or reference book.

Metropolitan Area WDM Networks - An AWG Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004): Martin Maier Metropolitan Area WDM Networks - An AWG Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Martin Maier
R4,027 Discovery Miles 40 270 Ships in 18 - 22 working days

This extensive volume provides a comprehensive and technically detailed overview of the latest metropolitan area WDM network experimental systems, architectures and access protocols. Readers will benefit from the thorough overview and gain an in-depth understanding of current and next-generation metro WDM networks.

QoS-based Wavelength Routing in Multi-Service WDM Networks (Paperback, Softcover reprint of the original 1st ed. 2001): Admela... QoS-based Wavelength Routing in Multi-Service WDM Networks (Paperback, Softcover reprint of the original 1st ed. 2001)
Admela Jukan
R1,415 Discovery Miles 14 150 Ships in 18 - 22 working days

The need to establish wavelength-routed connections in a service-differentiated fash ion is becoming increasingly important due to a variety of candidate client networks (e. g. IP, SDH/SONET, ATM) and the requirements for Quality-of-Service (QoS) de livery within transport layers. Up until now, the criteria for optical network design and operation have usually been considered independently of the higher-layer client signals (users), i. e. without taking into account particular requirements or constraints originating from the users' differentiation. Wavelength routing for multi-service net works with performance guarantees, however, will have to do with much more than finding a path and allocating wavelengths. The optimisation of wavelength-routed paths will have to take into account a number of user requirements and network con straints, while keeping the resource utilisation and blocking probability as low as pos sible. In a networking scenario where a multi-service operation in WDM networks is assumed, while dealing with heterogeneous architectures (e. g. technology-driven, as transparent, or regenerative), efficient algorithms and protocols for QoS-differentiated and dynamic allocation of physical resources will playa key role. This work examines the development of multi-criteria wavelength routing for WDM networks where a set of performances is guaranteed to each client network, taking into account network properties and physical constraints."

Photonic Slot Routing in Optical Transport Networks (Paperback, Softcover reprint of the original 1st ed. 2003): Gosse Wedzinga Photonic Slot Routing in Optical Transport Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Gosse Wedzinga
R2,634 Discovery Miles 26 340 Ships in 18 - 22 working days

All-optical networking is generally believed to be the only solution for coping with the ever-increasing demands in bandwidth, such as the World Wide Web application. Optical backbone networks efficiently achieve a high level of traffic aggregation by multiplexing numerous users on circuit-switched wavelength paths - the so-called wavelength routing approach. In contrast, the reduced level of traffic aggregation in access and metro networks makes wavelength routing solutions not adequate. In these network areas, packet-interleaved optical time-division multiplexing with its finer and more dynamic bandwidth allocation is advocated. The book presents such an approach, known as photonic slot routing. It illustrates how this approach may provide a cost-effective solution to deploying all-optical transport networks, using today's optical device technology. To that end, the author combines DWDM-technology with fixed slot optical switching, and gives a comprehensive description of this approach in which slots are aligned across the wavelengths to form groups of data-flows that propagate as a whole inside the network. Operating algorithms are developed, and network performance is analyzed, both by means of theoretical analysis and many simulations of sample networks. This work will be of particular interest to researchers and professionals who are active in photonic networking.

Disseminating Security Updates at Internet Scale (Paperback, Softcover reprint of the original 1st ed. 2003): Jun Li, Peter... Disseminating Security Updates at Internet Scale (Paperback, Softcover reprint of the original 1st ed. 2003)
Jun Li, Peter Reiher, Gerald J. Popek
R2,621 Discovery Miles 26 210 Ships in 18 - 22 working days

Disseminating Security Updates at Internet Scale describes a new system, "Revere", that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost. Disseminating Security Updates at Internet Scale will be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere". The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings... Information Systems Security - 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings (Paperback, 2012 ed.)
Venkat Venkatakrishnan, Diganta Goswami
R1,429 Discovery Miles 14 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.

Telecommunications Network Planning (Paperback, Softcover reprint of the original 1st ed. 1999): Brunilde Sanso, Patrick Soriano Telecommunications Network Planning (Paperback, Softcover reprint of the original 1st ed. 1999)
Brunilde Sanso, Patrick Soriano
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Telecommunications - central to our daily lives - continues to change dramatically. These changes are the result of technological advances, deregulation, the proliferation of broadband service offers, and the spectacular popularity of the Internet and wireless services. In such adynamic technological and economic environment, competition is increasing among service providers and among equipment manufacturers. Consequently, optimization of the planning process is becoming essential. Although telecommunications network planning has been tackled by the Operations Research community for some time, many fundamental problems remain challenging. Through its fourteen chapters, this book covers some new and some still challenging older problems which arise in the planning of telecommunication networks. Telecommunications Network Planning will benefit both telecommunications practitioners looking for efficient methods to solve their problems and operations researchers interested in telecommunications. The book examines network design and dimensioning problems; it explores Operation Research issues related to a new standard Asynchronous Transfer Mode (ATM); it overviews problems that arise when designing survivable SDH/SONET Networks; it considers some broadband network problems; and it concludes with three chapters on wireless and mobile networks. Leading area researchers have contributed their recent research on the telecommunications and network topics treated in the volume.

Multifractal Based Network Traffic Modeling (Paperback, Softcover reprint of the original 1st ed. 2003): Murali Krishna P.,... Multifractal Based Network Traffic Modeling (Paperback, Softcover reprint of the original 1st ed. 2003)
Murali Krishna P., Vikram M. Gadre, Uday B. Desai
R2,641 Discovery Miles 26 410 Ships in 18 - 22 working days

This helpful book provides an overview of existing broadband traffic modelling based on the Poisson process and its variants. It also offers very good coverage of models based on self-similar processes. The authors have focused throughout on the problem of broadband traffic modelling.

Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003):... Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Adrian Perrig, J. D. Tygar
R2,638 Discovery Miles 26 380 Ships in 18 - 22 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Positive 1D and 2D Systems (Paperback, Softcover reprint of the original 1st ed. 2002): Tadeusz Kaczorek Positive 1D and 2D Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Tadeusz Kaczorek
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

Moving on from earlier stochastic and robust control paradigms, this book introduces the reader to the fundamentals of probabilistic methods in the analysis and design of uncertain systems. It significantly reduces the computational cost of high-quality control and the complexity of the algorithms involved.

Dynamic Routing in Broadband Networks (Paperback, Softcover reprint of the original 1st ed. 2003): Marco Conte Dynamic Routing in Broadband Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Marco Conte
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

Dynamic Routing in Broadband Networks focuses on routing in broadband networks based on MPLS (Multiprotocol Label Switching) and ATM (Asynchronous Transfer Mode). The routing methods are based on the theory of Markov decision processes which forms a very accurate framework for on-line route optimization. The author shows the issue of performance optimization and scalability with respect to dynamic routing of logical connections in broadband networks. The methods used are applicable to routing virtual path connections (VPC) and virtual channel connections (VCC) in ATM networks as well as label switched paths (LSP) in MPLS networks. Simulation results and a performance comparison with reference routing are given for the different schemes.

Routing and Quality-of-Service in Broadband LEO Satellite Networks (Paperback, Softcover reprint of the original 1st ed. 2003):... Routing and Quality-of-Service in Broadband LEO Satellite Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Hoang Nam Nguyen
R3,991 Discovery Miles 39 910 Ships in 18 - 22 working days

Routing and Quality-of-Service in Broadband LEO Satellite Networks describes mechanisms for supporting Quality-of-Service (QoS) strategies that consider properties of low earth orbit satellite networks and their effects on link handover. A graph model representing the dynamic topology of a satellite constellation is introduced based on a new parameter, lifetime. Novel routing and resource reservation algorithms as well as connection admission control strategies are proposed to minimize the handover blocking probability while maintaining QoS requirements. The author also discusses the roles of satellites in an all-IP mobile network architecture and the problems of mobility, QoS provisioning, and routing. This work will be of particular interest to researchers and professionals working on mobility networking in next generation networks.

Swarm, Evolutionary, and Memetic Computing - Third International Conference, SEMCCO 2012, Bhubaneswar, India, December 20-22,... Swarm, Evolutionary, and Memetic Computing - Third International Conference, SEMCCO 2012, Bhubaneswar, India, December 20-22, 2012, Proceedings (Paperback, 2012 ed.)
Bijaya Ketan Panigrahi, Swagatam Das, Ponnuthurai Nagaratnam Suganthan, Pradipta Kumar Nanda
R1,553 Discovery Miles 15 530 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Swarm, Evolutionary, and Memetic Computing, SEMCCO 2012, held in Bhubaneswar, India, in December 2012. The 96 revised full papers presented were carefully reviewed and selected from 310 initial submissions. The papers cover a wide range of topics in swarm, evolutionary, memetic and other intelligent computing algorithms and their real world applications in problems selected from diverse domains of science and engineering.

21st Century Learning for 21st Century Skills - 7th European Conference on Technology Enhanced Learning, EC-TEL 2012,... 21st Century Learning for 21st Century Skills - 7th European Conference on Technology Enhanced Learning, EC-TEL 2012, Saarbrucken, Germany, September 18-21, 2012, Proceedings (Paperback, 2012 ed.)
Andrew Ravenscroft, Stefanie Lindstaedt, Carlos Delgado Kloos, Davinia Hernandez-Leo
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th European Conference on Technology Enhanced Learning, EC-TEL 2012, held in Saarbrucken, Germany, in September 2012. The 26 revised full papers presented were carefully reviewed and selected from 130 submissions. The book also includes 12 short papers, 16 demonstration papers, 11 poster papers, and 1 invited paper. Specifically, the programme and organizing structure was formed through the themes: mobile learning and context; serious and educational games; collaborative learning; organisational and workplace learning; learning analytics and retrieval; personalised and adaptive learning; learning environments; academic learning and context; and, learning facilitation by semantic means.

Phase-Locked Loops for Wireless Communications - Digital and Analog Implementation (Paperback, Softcover reprint of the... Phase-Locked Loops for Wireless Communications - Digital and Analog Implementation (Paperback, Softcover reprint of the original 1st ed. 1998)
Donald R. Stephens
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book is intended for the graduate or advanced undergraduate engineer. The primary motivation for writing the text was to present a complete tutorial of phase-locked loops with a consistent notation. As such, it can serve as a textbook in formal classroom instruction, or as a self-study guide for the practicing engineer. A former colleague, Kevin Kreitzer, had suggested that I write a text, with an emphasis on digital phase-locked loops. As modem designers, we were continually receiving requests from other engineers asking for a definitive reference on digital phase-locked loops. There are several good papers in the literature, but there was not a good textbook for either classroom or self-paced study. From my own experience in designing low phase noise synthesizers, I also knew that third-order analog loop design was omitted from most texts. With those requirements, the material in the text seemed to flow naturally. Chapter 1 is the early history of phase-locked loops. I believe that historical knowledge can provide insight to the development and progress of a field, and phase-locked loops are no exception. As discussed in Chapter 1, consumer electronics (color television) prompted a rapid growth in phase-locked loop theory and applications, much like the wireless communications growth today. xiv Preface Although all-analog phase-locked loops are becoming rare, the continuous time nature of analog loops allows a good introduction to phase-locked loop theory."

Multicasting on the Internet and its Applications (Paperback, Softcover reprint of the original 1st ed. 1998): Sanjoy Paul Multicasting on the Internet and its Applications (Paperback, Softcover reprint of the original 1st ed. 1998)
Sanjoy Paul
R4,055 Discovery Miles 40 550 Ships in 18 - 22 working days

This book covers the entire spectrum of multicasting on the Internet from link- to application-layer issues, including multicasting in broadcast and non-broadcast links, multicast routing, reliable and real-time multicast transport, group membership and total ordering in multicast groups. In-depth consideration is given to describing IP multicast routing protocols, such as, DVMRP, MOSPF, PIM and CBT, quality of service issues in network-layer using RSVP and ST-2, as well as the relationship between ATM and IP multicast. These discussions include coverage of key concepts using illustrative diagrams and various real-world applications. The protocols and the architecture of MBone are described, real-time multicast transport issues are addressed and various reliable multicast transport protocols are compared both conceptually and analytically. Also included is a discussion of video multicast and other cutting-edge research on multicast with an assessment of their potential impact on future internetworks.Multicasting on the Internet and Its Applications is an invaluable reference work for networking professionals and researchers, network software developers, information technology managers and graduate students.

Trellises and Trellis-Based Decoding Algorithms for Linear Block Codes (Paperback, Softcover reprint of the original 1st ed.... Trellises and Trellis-Based Decoding Algorithms for Linear Block Codes (Paperback, Softcover reprint of the original 1st ed. 1998)
Shu Lin, Tadao Kasami, Toru Fujiwara, Marc Fossorier
R4,014 Discovery Miles 40 140 Ships in 18 - 22 working days

As the demand for data reliability increases, coding for error control becomes increasingly important in data transmission systems and has become an integral part of almost all data communication system designs. In recent years, various trellis-based soft-decoding algorithms for linear block codes have been devised. New ideas developed in the study of trellis structure of block codes can be used for improving decoding and analyzing the trellis complexity of convolutional codes. These recent developments provide practicing communication engineers with more choices when designing error control systems. Trellises and Trellis-based Decoding Algorithms for Linear Block Codes combines trellises and trellis-based decoding algorithms for linear codes together in a simple and unified form. The approach is to explain the material in an easily understood manner with minimal mathematical rigor. Trellises and Trellis-based Decoding Algorithms for Linear Block Codes is intended for practicing communication engineers who want to have a fast grasp and understanding of the subject. Only material considered essential and useful for practical applications is included. This book can also be used as a text for advanced courses on the subject.

Declarative Agent Languages and Technologies IX - 9th International Workshop, DALT 2011, Taipei, Taiwan, May 3, 2011, Revised... Declarative Agent Languages and Technologies IX - 9th International Workshop, DALT 2011, Taipei, Taiwan, May 3, 2011, Revised Selected and Invited Papers (Paperback, 2012)
Chiaki Sakama, Sebastian Sardina, Wamberto Vasconcelos, Michael Winikoff
R1,374 Discovery Miles 13 740 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Declarative Agent Languages and Technologies, DALT 2011, held in Taipei, Taiwan, in May 2011. The volume contains 6 revised selected presented at DALT 2011, 7 best papers from the DALT series over the years, explaining how the research developed and how it influenced and impacted the community, the state-of-the-art and subsequent work, and two invited papers from the DALT Spring School, which took place in April 2011.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
History of Nordic Computing 4 - 4th IFIP…
Christian Gram, Per Rasmussen, … Hardcover R3,309 R2,062 Discovery Miles 20 620
Bootstrapping - Douglas Engelbart…
Thierry Bardini Hardcover R2,262 R1,867 Discovery Miles 18 670
Time Series with Mixed Spectra
Ta-Hsin Li Paperback R1,935 Discovery Miles 19 350
Ready - A Commodore 64 Retrospective
Roberto Dillon Hardcover R3,799 R3,268 Discovery Miles 32 680
Chromebook For Dummies
Peter H. Gregory Paperback R564 Discovery Miles 5 640
Raspberry Pi Pico DIY Workshop - Build…
Sai Yamanoor, Srihari Yamanoor Paperback R1,110 Discovery Miles 11 100
Brilliant Laptops for the Over 50s…
Joli Ballew Hardcover  (1)
R488 R448 Discovery Miles 4 480
Windows 10, Essentials for…
William R. Stanek Hardcover R1,672 Discovery Miles 16 720
Experimenting with Raspberry Pi
Warren Gay Paperback R1,419 Discovery Miles 14 190
How To Recover Deleted Files - Your Step…
Howexpert Hardcover R729 Discovery Miles 7 290

 

Partners