0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (47)
  • R250 - R500 (176)
  • R500+ (2,530)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Systems analysis & design

Foundations of Software Science and Computation Structures - 5th International Conference, FOSSACS 2002. Held as Part of the... Foundations of Software Science and Computation Structures - 5th International Conference, FOSSACS 2002. Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2002 Grenoble, France, April 8-12, 2002, Proceedings (Paperback, 2002 ed.)
Mogens Nielsen, Uffe Engberg
R1,579 Discovery Miles 15 790 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures, FOSSACS 2002, held in Grenoble, France, in April 2002.The 28 revised full papers presented together with an extended abstract of an invited paper were carefully reviewed and selected from a total of 67 submissions. Among the topics addressed are algebraic, categorical, logical, and geometric theories, models and methods which support the specification, synthesis, verification, analysis, and transformation of sequential, concurrent, distributed, and mobile programs and software systems.

Tools for Working with Guidelines - Annual Meeting of the Special Interest Group (Paperback, 2001 ed.): Jean Vanderdonckt,... Tools for Working with Guidelines - Annual Meeting of the Special Interest Group (Paperback, 2001 ed.)
Jean Vanderdonckt, Christelle Farenc
R4,037 Discovery Miles 40 370 Ships in 18 - 22 working days

This volume contains the papers presented at the International Workshop on Tools for Working with Guidelines, (TFWWG 2000), held in Biarritz, France, in October 2000. It is the final outcome of the International Special Interest Group on Tools for Working with Guidelines.Human-computer interaction guidelines have been recognized as a uniquely relevant source for improving the usability of user interfaces for interactive systems. The range of interactive techniques exploited by these interactive systems is rapidly expanding to include multimodal user interfaces, virtual reality systems, highly interactive web-based applications, and three-dimensional user interfaces. Therefore, the scope of guidelines' sources is rapidly expanding as well, and so are the tools that should support users who employ guidelines to ensure some form of usability.Tools For Working With Guidelines (TFWWG) covers not only software tools that designers, developers, and human factors experts can use to manage multiple types of guidelines, but also looks at techniques addressing organizational, sociological, and technological issues.

Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August... Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000. Proceedings (Paperback, 2000 ed.)
Mihir Bellare
R1,637 Discovery Miles 16 370 Ships in 18 - 22 working days

Crypto2000wasthe20thAnnualCryptoconference. Itwassponsoredbythe InternationalAssociationforCryptologicResearch(IACR)incooperationwith theIEEEComputerSocietyTechnicalCommitteeonSecurityandPrivacyand theComputerScienceDepartmentoftheUniversityofCaliforniaatSantaB- bara. Theconferencereceived120submissions,andtheprogramcommittee- lected32oftheseforpresentation. Extendedabstractsofrevisedversionsof thesepapersareintheseproceedings. Theauthorsbearfullresponsibilityfor thecontentsoftheirpapers. Theconferenceprogramincludedtwoinvitedlectures. DonCoppersmith's presentation"ThedevelopmentofDES"recordedhisinvolvementwithoneof themostimportantcryptographicdevelopmentsever,namelytheDataEncr- tionStandard,andwasparticularlyaptgiventheimminentselectionofthe AdvancedEncryptionStandard. Mart'?nAbadi'spresentation"Tamingthe- versary"wasaboutbridgingthegapbetweenusefulbutperhapssimplisticthreat abstractionsandrigorousadversarialmodels,orperhaps,evenmoregenerally, betweenviewpointsofthesecurityandcryptographycommunities. Anabstract correspondingtoMart'?n'stalkisincludedintheseproceedings. Theconferenceprogramalsoincludeditstraditional"rumpsession"ofshort, informalorimpromptupresentations,chairedthistimebyStuartHaber. These presentationsarenotre?ectedintheseproceedings. Anelectronicsubmissionprocesswasavailableandrecommended,butforthe ?rsttimeusedawebinterfaceratherthanemail. (Perhapsasaresult,therewere nohardcopysubmissions. )Thesubmissionreviewprocesshadthreephases. In the?rstphase,programcommitteememberscompiledreports(assistedattheir discretionbysub-refereesoftheirchoice,butwithoutinteractionwithother programcommitteemembers)andenteredthem,viawebforms,intoweb-review softwarerunningatUCSD. Inthesecondphase,committeemembersusedthe softwaretobrowseeachother'sreports,discuss,andupdatetheirownreports. Lastlytherewasaprogramcommitteemeetingtodiscussthedi?cultcases. Iamextremelygratefultotheprogramcommitteemembersfortheiren- mousinvestmentoftime,e?ort,andadrenalineinthedi?cultanddelicate processofreviewandselection. (Alistofprogramcommitteemembersands- refereestheyinvokedcanbefoundonsucceedingpagesofthisvolume. )Ialso thanktheauthorsofsubmittedpapers-inequalmeasureregardlessofwhether theirpaperswereacceptedornot-fortheirsubmissions. Itistheworkofthis bodyofresearchersthatmakesthisconferencepossible. IthankRebeccaWrightforhostingtheprogramcommitteemeetingatthe AT&TbuildinginNewYorkCityandmanagingthelocalarrangements,and RanCanettifororganizingthepost-PC-meetingdinnerwithhischaracteristic gastronomicandoenophilic?air. VI Preface Theweb-reviewsoftwareweusedwaswrittenforEurocrypt2000byWim MoreauandJorisClaessensunderthedirectionofEurocrypt2000programchair BartPreneel,andIthankthemforallowingustodeploytheirusefulandcolorful tool. IammostgratefultoChanathipNamprempre(aka. Meaw)whoprovided systems,logistical,andmoralsupportfortheentireCrypto2000process. She wrotethesoftwarefortheweb-basedsubmissions,adaptedandranthew- reviewsoftwareatUCSD,andcompiledthe?nalabstractsintotheproceedings youseehere. ShetypesfasterthanIspeak. IamgratefultoHugoKrawczykforhisinsightandadvice,providedovera longperiodoftimewithhisusualcombinationofhonestyandcharm,andto himandotherpastprogramcommitteechairs,mostnotablyMichaelWiener andBartPreneel,forrepliestothehostofquestionsIposedduringthep- cess. InadditionIreceivedusefuladvicefrommanymembersofourcommunity includingSilvioMicali,TalRabin,RonRivest,PhilRogaway,andAdiShamir. FinallythankstoMattFranklinwhoasgeneralchairwasinchargeofthelocal organizationand?nances,and,ontheIACRside,toChristianCachin,Kevin McCurley,andPaulVanOorschot. ChairingaCryptoprogramcommitteeisalearningprocess. Ihavecometo appreciateevenmorethanbeforethequalityandvarietyofworkinour?eld, andIhopethepapersinthisvolumecontributefurthertoitsdevelopment. June2000 MihirBellare ProgramChair,Crypto2000 CRYPTO2000 August20-24,2000,SantaBarbara,California,USA Sponsoredbythe InternationalAssociationforCryptologicResearch(IACR) incooperationwith IEEEComputerSocietyTechnicalCommitteeonSecurityandPrivacy, ComputerScienceDepartment,UniversityofCalifornia,SantaBarbara GeneralChair MatthewFranklin,XeroxPaloAltoResearchCenter,USA ProgramChair MihirBellare,UniversityofCalifornia,SanDiego,USA ProgramCommittee AlexBiryukov...WeizmannInstituteofScience,Israel DanBoneh...StanfordUniversity,USA ChristianCachin...IBMResearch,Switzerland RanCanetti...IBMResearch,USA RonaldCramer...ETHZurich,Switzerland YairFrankel...CertCo,USA ShaiHalevi...IBMResearch,USA ArjenLenstra...Citibank,USA MitsuruMatsui...MitsubishiElectricCorporation,Japan PaulVanOorschot...EntrustTechnologies,Canada BartPreneel...KatholiekeUniversiteitLeuven,Belgium PhillipRogaway. ..UniversityofCalifornia,Davis,USA VictorShoup...IBMZurich,Switzerland JessicaStaddon...BellLabsResearch,PaloAlto,USA JacquesStern...EcoleNormaleSup'erieure,France DougStinson...UniversityofWaterloo,Canada SalilVadhan...MassachusettsInstituteofTechnology,USA DavidWagner...UniversityofCalifornia,Berkeley,USA RebeccaWright...AT&TLaboratoriesResearch,USA Advisorymembers MichaelWiener(Crypto1999programchair). . EntrustTechnologies,Canada JoeKilian(Crypto2001programchair)...Intermemory,USA VIII Organization Sub-Referees BillAiello,JeeheaAn,OlivierBaudron,DonBeaver,JoshBenaloh,JohnBlack, SimonBlackburn,AlexandraBoldyreva,NikitaBorisov,VictorBoyko,Jan- menisch,SureshChari,ScottContini,DonCoppersmith,ClaudeCr'epeau,Ivan Damg?ard,AnandDesai,GiovanniDiCrescenzo,YevgeniyDodis,Matthias Fitzi,MattFranklin,RosarioGennaro,GuangGong,LuisGranboulan,Nick Howgrave-Graham,RussellImpagliazzo,YuvalIshai,MarkusJakobsson,Stas Jarecki,ThomasJohansson,CharanjitJutla,JoeKilian,EyalKushilevitz,Moses Liskov,StefanLucks,AnnaLysyanskaya,PhilipMacKenzie,SubhamoyMaitra, TalMalkin,BarbaraMasucci,AlfredMenezes,DanieleMicciancio,SaraMiner, IliaMironov,MoniNaor,PhongNguyen,RafailOstrovsky,ErezPetrank,Birgit P?tzmann,BennyPinkas,DavidPointcheval,GuillaumePoupard,TalRabin, CharlieRacko? ,Zul?karRamzan,OmerReingold,LeoReyzin,PankajRohatgi, AmitSahai,LouisSalvail,ClausSchnorr,MikeSemanko,BobSilverman,Joe Silverman,DanSimon,NigelSmart,BenSmeets,AdamSmith,MartinStrauss, GaneshSundaram,SergeVaudenay,FrederikVercauteren,BernhardvonSt- gel,RuizhongWei,SusanneGudrunWetzel,ColinWilliams,StefanWolf,Felix Wu,YiqunLisaYin,AmirYoussef,RobertZuccherato TableofContents XTRandNTRU TheXTRPublicKeySystem...1 ArjenK. Lenstra,EricR. Verheul AChosen-CiphertextAttackagainstNTRU...20 ' ElianeJaulmes,AntoineJoux PrivacyforDatabases PrivacyPreservingDataMining ...36 YehudaLindell,BennyPinkas ReducingtheServersComputationinPrivateInformationRetrieval: PIRwithPreprocessing...55 AmosBeimel,YuvalIshai,TalMalkin SecureDistributedComputationandApplications ParallelReducibilityforInformation-TheoreticallySecureComputation...74 YevgeniyDodis,SilvioMicali OptimisticFairSecureComputation...93 ChristianCachin,JanCamenisch ACryptographicSolutiontoaGameTheoreticProblem...112 YevgeniyDodis,ShaiHalevi,TalRabin AlgebraicCryptosystems Di?erentialFaultAttacksonEllipticCurveCryptosystems...131 IngridBiehl,BerndMeyer,VolkerMul ..ler QuantumPublic-KeyCryptosystems ...1 47 TatsuakiOkamoto,KeisukeTanaka,ShigenoriUchiyama NewPublic-KeyCryptosystemUsingBraidGroups ...166 KiHyoungKo,SangJinLee,JungHeeCheon,JaeWooHan, Ju-sungKang,ChoonsikPark MessageAuthentication KeyRecoveryandForgeryAttacksontheMacDESMACAlgorithm ...184 DonCoppersmith,LarsR. Knudsen,ChrisJ. Mitchell X TableofContents CBCMACsforArbitrary-LengthMessages:TheThree-KeyConstructions 197 JohnBlack,PhillipRogaway L-collisionAttacksagainstRandomizedMACs...216 MichaelSemanko DigitalSignatures OntheExactSecurityofFullDomainHash...229 Jean-S' ebastienCoron TimedCommitments...236 DanBoneh,MoniNaor APracticalandProvably SecureCoalition-ResistantGroupSignatureScheme...255 GiuseppeAteniese,JanCamenisch,MarcJoye,GeneTsudik ProvablySecurePartiallyBlindSignatures...271 MasayukiAbe,TatsuakiOkamoto Cryptanalysis n WeaknessesintheSL (IF )HashingScheme...287 2 2 RainerSteinwandt,MarkusGrassl,WilliGeiselmann,ThomasBeth FastCorrelationAttacksthroughReconstructionofLinearPolynomials . . 300 ThomasJohansson,FredrikJ.. onsson TraitorTracingandBroadcastEncryption SequentialTraitorTracing...

Algorithms - ESA 2001 - 9th Annual European Symposium, Aarhus, Denmark, August 28-31, 2001, Proceedings (Paperback, 2001 ed.):... Algorithms - ESA 2001 - 9th Annual European Symposium, Aarhus, Denmark, August 28-31, 2001, Proceedings (Paperback, 2001 ed.)
Friedhelm Meyer Auf Der Heide
R1,494 Discovery Miles 14 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th Annual European Symposium on Algorithms, ESA 2001, held in Aarhus, Denmark, in August 2001.
The 41 revised full papers presented together with three invited contributions were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections on caching and prefetching, online algorithms, data structures, optimization and approximation, sequences, scheduling, shortest paths, geometry, distributed algorithms, graph algorithms, pricing, broadcasting and multicasting, graph labeling and graph drawing, and graphs.

Real-Time and Multi-Agent Systems (Paperback, Softcover reprint of the original 1st ed. 2000): S Ingram Real-Time and Multi-Agent Systems (Paperback, Softcover reprint of the original 1st ed. 2000)
S Ingram; Ammar Attoui
R1,460 Discovery Miles 14 600 Ships in 18 - 22 working days

This book provides a detailed account of real-time systems, including program structures for real-time, phases development analysis, and formal specification and verification methods of reactive systems.Real-Time and Multi-Agent Systems brings together the 3 key fields of current and future data-processing:- Distributed systems and applications;- Parallel scientific computing;- Real-time and manufacturing systems.It covers the basic concepts and theories, methods, techniques and tools currently used in the specification and implementation of applications and contains lots of examples as well as complete case studies.

Correct System Design - Recent Insights and Advances (Paperback, 1999 ed.): Ernst-Rudiger Olderog, Bernhard Steffen Correct System Design - Recent Insights and Advances (Paperback, 1999 ed.)
Ernst-Rudiger Olderog, Bernhard Steffen
R1,570 Discovery Miles 15 700 Ships in 18 - 22 working days

Computers are gaining more and more control over systems that we use or rely on in our daily lives, privately as well as professionally. In safety-critical applications, as well as in others, it is of paramount importance that systems controled by a computer or computing systems themselves reliably behave in accordance with the specification and requirements, in other words: here correctness of the system, of its software and hardware is crucial. In order to cope with this callenge, software engineers and computer scientists need to understand the foundations of programming, how different formal theories are linked together, how compilers correctly translate high-level programs into machine code, and why transformations performed are justifiable. This book presents 17 mutually reviewed invited papers organized in sections on methodology, programming, automation, compilation, and application.

Cooperative Buildings. Integrating Information, Organizations, and Architecture - Second International Workshop,... Cooperative Buildings. Integrating Information, Organizations, and Architecture - Second International Workshop, CoBuild'99, Pittsburgh, PA, USA, October 1-2, 1999, Proceedings (Paperback, 1999 ed.)
Norbert Streitz, Jane Siegel, Volker Hartkopf, Shinichi Konomi
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days

This volume constitutes the proceedings of the "Second International Workshop on Cooperative Buildings (CoBuild'99) - Integrating Information, Organizations, and Architecture" held at the Carnegie Museum of Art in Pittsburgh on October 1-2, 1999. The success of the First International Workshop on Cooperative Buildings (CoBuild'98), held at GMD in Darmstadt in February 1998, showed that there is a demand for an appropriate forum to present research about the intersection of information technology, organizational innovation, and architecture. Thus, it was decided to organize a follow-up event. The decision of where to organize CoBuild'99 was straight forward. Since we had many high quality contributions from the United States (U. S. ) presented at CoBuild'98, we wanted to hold the second workshop in the U. S. reaching out to a large audience and at the same time turning it into an international series of events held in different places in the world. Due to the excellent work carried out at Carnegie Mellon University, it was an obvious choice to ask Volker Hartkopf from the Department of Architecture and Jane Siegel from the Human Computer Interaction Institute to be conference cochairs for CoBuild'99. The workshop is organized in cooperation with the German National Research Center for Information Technology (GMD), in particular the Integrated Publication and Information Systems Institute (IPSI) in Darmstadt providing continuity between the events.

Static Analysis - 6th International Symposium, SAS'99, Venice, Italy, September 22-24, 1999, Proceedings (Paperback, 1999... Static Analysis - 6th International Symposium, SAS'99, Venice, Italy, September 22-24, 1999, Proceedings (Paperback, 1999 ed.)
Agostino Cortesi, Gilberto File
R1,534 Discovery Miles 15 340 Ships in 18 - 22 working days

Static analysis is increasingly recognized as a fundamental reasearch area aimed at studying and developing tools for high performance implementations and v- i cation systems for all programming language paradigms. The last two decades have witnessed substantial developments in this eld, ranging from theoretical frameworks to design, implementation, and application of analyzers in optim- ing compilers. Since 1994, SAS has been the annual conference and forum for researchers in all aspects of static analysis. This volume contains the proceedings of the 6th International Symposium on Static Analysis (SAS'99) which was held in Venice, Italy, on 22{24 September 1999. The previous SAS conferences were held in Namur (Belgium), Glasgow (UK), Aachen (Germany), Paris (France), and Pisa (Italy). The program committee selected 18 papers out of 42 submissions on the basis of at least three reviews. The resulting volume o ers to the reader a complete landscape of the research in this area. The papers contribute to the following topics: foundations of static analysis, abstract domain design, and applications of static analysis to di erent programming paradigms (concurrent, synchronous, imperative, object oriented, logical, and functional). In particular, several papers use static analysis for obtaining state space reduction in concurrent systems. New application elds are also addressed, such as the problems of security and secrecy.

Computer-Based Diagnostic Systems (Paperback, Edition. ed.): Chris Price Computer-Based Diagnostic Systems (Paperback, Edition. ed.)
Chris Price
R1,374 Discovery Miles 13 740 Ships in 18 - 22 working days

Computer-based diagnostic systems are among the most successful applications of knowledge-based systems (KBS) technology. Chris Price shows the best way to build effective diagnostic systems for different types of diagnostic problems by: - giving examples of different solutions to the problem of building effective diagnostic systems - helping you to decide on an appropriate strategy for building a diagnostic system to aid troubleshooting of that diagnostic problem - showing how to use diagnostic fault trees as a common representation for discussing different ways of approaching diagnosis. Computer-Based Diagnostic Systems is written in such a way as to make the material easy to understand even when you do not have easy access to the commercial tools.

Dependable Computing - EDDC-3 - Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999,... Dependable Computing - EDDC-3 - Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings (Paperback, 1999 ed.)
Jan Hlavicka, Erik Maehle, Andras Pataricza
R1,595 Discovery Miles 15 950 Ships in 18 - 22 working days

The idea of creating the European Dependable Computing Conference (EDCC) was born at the moment when the Iron Curtain fell. A group of enthusiasts, who were pre viously involved in research and teaching in the ?eld of fault tolerant computing in different European countries, agreed that there is no longer any point in keeping pre viously independent activities apart and created a steering committee which took the responsibility for preparing the EDCC calendar and appointing the chairs for the in dividual conferences. There is no single European or global professional organization that took over the responsibility for this conference, but there are three national in terest groups that sent delegates to the steering committee and support its activities, especially by promoting the conference materials. As can be seen from these materi als, they are the SEE Working Group "Dependable Computing" (which is a successor organizationof AFCET)in France, theGI/ITG/GMATechnicalCommitteeonDepend ability and Fault Tolerance in Germany, and the AICA Working Group "Dependability of Computer Systems" in Italy. In addition, committees of several global professional organizations, such as IEEE and IFIP, support this conference. Prague has been selected as a conference venue for several reasons. It is an easily accessible location that may attract many visitors by its beauty and that has a tradition in organizing international events of this kind (one of the last FTSD conferences took place here).

High-Integrity System Specification and Design (Paperback, Softcover reprint of the original 1st ed. 1999): Jonathan P. Bowen,... High-Integrity System Specification and Design (Paperback, Softcover reprint of the original 1st ed. 1999)
Jonathan P. Bowen, Michael G. Hinchey
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

This volume provides the reader with a comprehensive introduction to system specification and design methods, with particular emphasis on structured and formal methods, method integration, concurrency and safety-critical systems. It contains both new material by Michael Hinchey and Jonathan Bowen, along with reprints of classic articles on high-integrity systems which have never before appeared together in a single volume. Among these classic articles are contributions from such leading names as Leslie Lamport, Nancy Leveson, and C.A.R. Hoare. Also included is a Foreword by David Lorge Parnas. High-Integrity System Specification and Design will provide practitioners and researchers convenient access to a range of essential essays - both classic and state-of-the-art - in a single volume. It provides them with details of specification and design approaches for this type of system, an overview of the development process, and evidence of how various classes of high- integrity systems may be approached and developed successfully.

Methodologies for Developing and Managing Emerging Technology Based Information Systems - Information Systems Methodologies... Methodologies for Developing and Managing Emerging Technology Based Information Systems - Information Systems Methodologies 1998, Sixth International Conference on Information Systems Methodologies (Paperback, Edition. ed.)
Trevor Wood-Harper, Nimal Jayaratna, Bob Wood
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This volume contains the proceedings of the 6th International Conference of the BCS Specialist Group on Information Systems Methodologies. The conference brought together papers on methodology issues related to the development and management of emerging technology based information systems. As usual there was a good range of papers addressing the 'soft' and 'hard' aspects of IS development and management. Methodologies for Developing and Managing Emerging Technology-based Information Systems will be of interest to practitioners who are engaged in systems development and modifying or aligning existing methodologies to practice.

Neural Networks in the Analysis and Design of Structures (Paperback, 1999 ed.): Zenon Waszczysznk Neural Networks in the Analysis and Design of Structures (Paperback, 1999 ed.)
Zenon Waszczysznk
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

Neural Networks are a new, interdisciplinary tool for information processing. Neurocomputing being successfully introduced to structural problems which are difficult or even impossible to be analysed by standard computers (hard computing). The book is devoted to foundations and applications of NNs in the structural mechanics and design of structures.

Hybrid Systems V (Paperback, 1999 ed.): Panos J. Antsaklis, Wolf Kohn, Michael Lemmon, Anil Nerode, Shankar Sastry Hybrid Systems V (Paperback, 1999 ed.)
Panos J. Antsaklis, Wolf Kohn, Michael Lemmon, Anil Nerode, Shankar Sastry
R1,586 Discovery Miles 15 860 Ships in 18 - 22 working days

Hybrid systems are interacting networks of digital and continuous systems. - brid systems arise throughout business and industry in areas such as interactive distributed simulation, trac control, plant process control, military command and control, aircraft and robot design, and path planning. Three of the fun- mental problems that hybrid systems theory should address are: How to model physical and information systems as hybrid systems; how to verify that their - havior satis es program or performance specic ations; and how to extract from performancespeci cationsforanetworkofphysicalsystemsandtheirsimulation models digital control programs which will force the network to obey its perf- mance speci cation. This rapidly developing area is at the interface of control, engineeringandcomputer science. Methods under developmentareextensionsof thosefromdiverseareassuchasprogramveri cation, concurrentanddistributed processes, logic programming, logics of programs, discrete event simulation, c- culus of variations, optimization, di erential geometry, Lie algebras, automata theory, dynamical systems, etc. When the rst LNCS volume Hybrid Systems was published in 1993, the e ect was to focus the attention of researchers worldwide on developing theory andengineeringtoolsapplicabletohybridsystemsinwhichcontinuousprocesses interact with digital programs in real time. At the time of publication of this fth volume, there is general agreement that this is an important area in which mathematics, control engineering, and computer science can be fruitfully c- bined. There are now hybrid system sections in many engineering and computer scienceinternationalmeetings, hybridsystems researchgroupsin manyuniver- ties and industrial laboratories, and also other excellent series of hybrid systems conferenc

Towards System Safety - Proceedings of the Seventh Safety-critical Systems Symposium, Huntingdon, UK 1999 (Paperback, Softcover... Towards System Safety - Proceedings of the Seventh Safety-critical Systems Symposium, Huntingdon, UK 1999 (Paperback, Softcover reprint of the original 1st ed. 1999)
Felix Redmill, Tom Anderson
R2,647 Discovery Miles 26 470 Ships in 18 - 22 working days

Each year the Safety-critical Systems Symposium brings together practitioners and researchers in a quest to inculcate a higher degree of safety engineering into the development and operation of critical software-based systems. On this, the Symposium's seventh occasion, it explores recent work and experience which lead us further 'towards system safety'. This book of the Proceedings covers the entire event. The first paper is the course text of a tutorial run on the first day of the Symposium, included here to provide readers with a coverage of the entire event. The next fourteen papers were presented, on the second and third days, in six sessions: Safety Cases, Systems Engineering, Safety Analysis and Safety Integrity, Tools for Software Safety, Solving Safety Problems, and Qllestions and Competences. Eight of the fourteen papers were authored in industry, four in universities, and two in other research establishments. Four of them report on work outside the UK: in France, Germany, Norway and Brazil. There are three papers on safety cases, each taking a different perspective. Skogstad from Norway and Boyce and Hamilton of GEC-Marconi both report on experience in the field, the former in attempting to apply European norms to project documentation and the latter in attempting to build up a retrospective safety case. The third paper, by Goodman, takes a more philosophical stance, examining the lack of useful measurement in safety assurance.

Typed Lambda Calculi and Applications - 4th International Conference, TLCA'99, L'Aquila, Italy, April 7-9, 1999,... Typed Lambda Calculi and Applications - 4th International Conference, TLCA'99, L'Aquila, Italy, April 7-9, 1999, Proceedings (Paperback, 1999 ed.)
Jean-Yves Girard
R1,555 Discovery Miles 15 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Typed Lambda Calculi and Applications, TLCA'99, held in L'Aquila, Italy in April 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 50 submissions. Also included are two invited demonstrations. The volume reports research results on various aspects of typed lambda calculi. Among the topics addressed are noncommutative logics, type theory, algebraic data types, logical calculi, abstract data types, and subtyping.

Tools and Algorithms for the Construction of Analysis of Systems - 5th International Conference, TACAS'99, Held as Part of... Tools and Algorithms for the Construction of Analysis of Systems - 5th International Conference, TACAS'99, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS'99, Amsterdam, The Netherlands, March 22-28, 1999, Proceedings (Paperback, 1999 ed.)
W. Rance Cleaveland
R1,586 Discovery Miles 15 860 Ships in 18 - 22 working days

ETAPS'99 is the second instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual federated conference that was established in 1998 by combining a number of existing and new conferences. This year it comprises ve conferences (FOSSACS, FASE, ESOP, CC, TACAS), four satellite workshops (CMCS, AS, WAGA, CoFI), seven invited lectures, two invited tutorials, and six contributed tutorials. The events that comprise ETAPS address various aspects of the system - velopment process, including speci cation, design, implementation, analysis and improvement. The languages, methodologies and tools which support these - tivities are all well within its scope. Dieren t blends of theory and practice are represented, with an inclination towards theory with a practical motivation on one hand and soundly-based practice on the other. Many of the issues involved in software design apply to systems in general, including hardware systems, and the emphasis on software is not intended to be exclusive.

Abstract Compositional Analysis of Iterated Relations - A Structural Approach to Complex State Transition Systems (Paperback,... Abstract Compositional Analysis of Iterated Relations - A Structural Approach to Complex State Transition Systems (Paperback, 1998 ed.)
Frederic Geurts
R1,407 Discovery Miles 14 070 Ships in 18 - 22 working days

State-transition systems model machines, programs, and speci?cations [20, 23,284,329],butalsothegrowthanddeclineofantpopulations,?nancial markets, diseases and crystals [22, 35, 178, 209, 279]. In the last decade, thegrowinguseofdigitalcontrollersinvariousenvironmentshasentailed theconvergenceofcontroltheoryandreal-timesystemstowardhybrids- tems [16] by combining both discrete-event facets of reality with Nature's continuous-time aspects. The computing scientist and the mathematician have re-discovered each other. Indeed, in the late sixties, the programming language Simula, "father" of modern object-oriented languages, had already been speci?cally designed to model dynamical systems [76]. Today,theimportanceofcomputer-basedsystemsinbanks,telecom- nication systems, TVs, planes and cars results in larger and increasingly complex models. Two techniques had to be developed and are now fruitfully used to keep analytic and synthetic processes feasible: composition and - straction.Acompositionalapproachbuildssystemsbycomposingsubsystems that are smaller and more easily understood or built. Abstraction simpli?es unimportantmattersandputstheemphasisoncrucialparametersofsystems. Inordertodealwiththecomplexityofsomestate-transitionsystemsand tobetterunderstandcomplexorchaoticphenomenaemergingoutofthe behaviorofsomedynamicalsystems,theaimofthismonographistopresent ?rststepstowardtheintegratedstudyofcompositionandabstractionin dynamical systems de?ned by iterated relations. Themaininsightsandresultsofthisworkconcernastructuralorm f of complexityobtainedbycompositionofsimpleinteractingsystemspresenting opposedattractingbehaviors.Thiscomplexityexpressesitselfintheevo- tionofcomposedsystems,i.e.,theirdynamics,andintherelationsbetween their initial and ?nal states, i.e., the computations they realize. The theor- ical results presented in the monograph are then validated by the analysis ofdynamicalandcomputationalpropertiesoflow-dimensionalprototypesof chaotic systems (e.g. Smale horseshoe map, Cantor relation, logistic map), high-dimensional spatiotemporally complex systems (e.g. cellular automata), and formal systems (e.g. paperfoldings, Turing machines). Acknowledgements. ThismonographisarevisionofmyPhDthesiswhichwas completed at the Universit' e catholique de Louvain (Belgium) in March 96. VIII Preface The results presented here have been in?uenced by many people and I would like to take this opportunity to thank them all.

Middleware 2000 - IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing New York,... Middleware 2000 - IFIP/ACM International Conference on Distributed Systems Platforms and Open Distributed Processing New York, NY, USA, April 4-7, 2000 Proceedings (Paperback, 2000 ed.)
Joseph Sventek, Geoffrey Coulson
R1,577 Discovery Miles 15 770 Ships in 18 - 22 working days

Middleware is everywhere. Ever since the advent of sockets and other virtu- circuit abstractions, researchers have been looking for ways to incorporate high- value concepts into distributed systems platforms. Most distributed applications, especially Internet applications, are now programmed using such middleware platforms. Prior to 1998, there were several major conferences and workshops at which research into middleware was reported, including ICODP (International C- ference on Open Distributed Processing), ICDP (International Conference on Distributed Platforms) and SDNE (Services in Distributed and Networked - vironments). Middleware'98was a synthesis of these three conferences. Middleware 2000 continued the excellent tradition of Middleware'98. It p- vided a single venue for reporting state-of-the-art results in the provision of distributed systems platforms. The focus of Middleware 2000 was the design, implementation, deployment, and evaluation of distributed systems platforms and architectures for future networked environments. Among the 70 initial submissions to Middleware 2000, 21 papers were - lected for inclusion in the technical program of the conference. Every paper was reviewed by four members of the program committee. The papers were judged - cording to their originality, presentation quality, and relevance to the conference topics. The accepted papers cover various subjects such as caching, re?ection, quality of service, and transactions.

Prospects for Hardware Foundations - ESPRIT Working Group 8533 NADA - New Hardware Design Methods Survey Chapters (Paperback):... Prospects for Hardware Foundations - ESPRIT Working Group 8533 NADA - New Hardware Design Methods Survey Chapters (Paperback)
Bernhard Moeller, John V. Tucker
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

Preface VI I X Table of Contents B. Moeller and J.V. Tucker (Eds.): Prospects for Hardware Foundations, LNCS 1546, pp. 1-26, 1998. Springer-Verlag Berlin Heidelberg 1998 2 The NADA Group Introduction: NADA and NIL 3 4 The NADA Group Introduction: NADA and NIL 5 6 The NADA Group Introduction: NADA and NIL 7 8 The NADA Group Introduction: NADA and NIL 9 10 The NADA Group Introduction: NADA and NIL 11 12 The NADA Group Introduction: NADA and NIL 13 14 The NADA Group Introduction: NADA and NIL 15 16 The NADA Group Introduction: NADA and NIL 17 18 The NADA Group Introduction: NADA and NIL 19 20 The NADA Group Introduction: NADA and NIL 21 22 The NADA Group Introduction: NADA and NIL 23 24 The NADA Group Introduction: NADA and NIL 25 26 The NADA Group Streams, Stream Transformers and Domain Representations B. Moeller and J.V. Tucker (Eds.): Prospects for Hardware Foundations, LNCS 1546, pp. 27-68, 1998. Springer-Verlag Berlin Heidelberg 1998 28 J. Blanck, V. Stoltenberg-Hansen, and J.V. Tucker Streams, Stream Transformers and Domain Representations 29 30 J. Blanck, V. Stoltenberg-Hansen, and J.V. Tucker Streams, Stream Transformers and Domain Representations 31 32 J. Blanck, V. Stoltenberg-Hansen, and J.V. Tucker Streams, Stream Transformers and Domain Representations 33 34 J. Blanck, V. Stoltenberg-Hansen, and J.V. Tucker Streams, Stream Transformers and Domain Representations 35 36 J. Blanck, V. Stoltenberg-Hansen, and J.V. Tucker Streams, Stream Transformers and Domain Representations 37

Introduction to the Formal Design of Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 1999): David F.... Introduction to the Formal Design of Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 1999)
David F. Gray
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

but when we state that A 'equals' B , as well having to know what we mean by A and B we also have know what we mean by 'equals'. This section explores the role of observers; how different types of observ er see different things as being equal, and how we can produce algo rithms to decide on such equalities. It also explores how we go about writing specifications to which we may compare our SCCS designs. * The final section is the one which the students like best. Once enough of SCCS is grasped to decide upon the component parts of a design, the 'turning the handle' steps of composition and check ing that the design meets its specification are both error-prone and tedious. This section introduces the concurrency work bench, which shoulders most of the burden. How you use the book is up to you; I'm not even going to suggest path ways. Individual readers know what knowledge they seek, and course leaders know which concepts they are trying to impart and in what order.

Human Error and System Design and Management (Paperback, 2000 ed.): P. F. Elzer, R.H. Kluwe, B. Boussoffara Human Error and System Design and Management (Paperback, 2000 ed.)
P. F. Elzer, R.H. Kluwe, B. Boussoffara
R2,707 Discovery Miles 27 070 Ships in 18 - 22 working days

Human Error and System Design and Management contains a collection of contributions presented at an international workshop with the same name held from March 24-26, 1999 at the Technical University of Clausthal, Germany. The purpose of this workshop was to discuss the results of a research project investigating the "Influences of Human-Machine-Interfaces on the Error-proneness of Operator Interaction with Technical Systems" in a broad context. Therefore experts from academia and industry were invited to participate so that practical as well as theoretical aspects of the subject matter were covered. Topics included recent considerations concerning multimedia and ecological interfaces as well as situation awareness.
This book contains the current thinking on this discussion and can be regarded as a supplement to engineers and researchers who are active in the area of human machine interfaces.

Systems: Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 1998): Rudolf Albrecht Systems: Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 1998)
Rudolf Albrecht
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

There is hardly a science that is without the notion of "system." We have systems in mathematics, formal systems in logic, systems in physics, electrical and mechanical engineering, architectural-, operating-, infonnation-, programming systems in computer science, management-and PJoduction systems in industrial applications, economical-, ecological-, biological systems, and many more. In many of these disciplines formal tools for system specification, construction, verification, have been developed as well as mathematical concepts for system modeling and system simulation. Thus it is quite natural to expect that systems theory as an interdisciplinary and well established science offering general concepts and methods for a wide variety of applications is a subject in its own right in academic education. However, as can be seen from the literature and from the curricula of university studies -at least in Central Europe-, it is subordinated and either seen as part of mathematics with the risk that mathematicians, who may not be familiar with applications, define it in their own way, or it is treated separately within each application field focusing on only those aspects which are thought to be needed in the particular application. This often results in uneconomical re-inventing and re-naming of concepts and methods within one field, while the same concepts and methods are already well introduced and practiced in other fields. The fundamentals on general systems theory were developed several decades ago. We note the pioneering work of M. A. Arbib, R. E. Kalman, G. 1. Klir, M. D.

FM'99 - Formal Methods - World Congress on Formal Methods in the Developement of Computing Systems, Toulouse, France,... FM'99 - Formal Methods - World Congress on Formal Methods in the Developement of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I (Paperback, 1999 ed.)
Jeannette M. Wing, Jim Woodcook, Jim Davies
R2,829 Discovery Miles 28 290 Ships in 18 - 22 working days

Formal methods are coming of age. Mathematical techniques and tools are now regarded as an important part of the development process in a wide range of industrial and governmental organisations. A transfer of technology into the mainstream of systems development is slowly, but surely, taking place. FM'99, the First World Congress on Formal Methods in the Development of Computing Systems, is a result, and a measure, of this new-found maturity. It brings an impressive array of industrial and applications-oriented papers that show how formal methods have been used to tackle real problems. These proceedings are a record of the technical symposium ofFM'99: alo- side the papers describingapplicationsofformalmethods, youwill ndtechnical reports, papers, andabstracts detailing new advances in formaltechniques, from mathematical foundations to practical tools. The World Congress is the successor to the four Formal Methods Europe Symposia, which in turn succeeded the four VDM Europe Symposia. This s- cession re?ects an increasing openness within the international community of researchers and practitioners: papers were submitted covering a wide variety of formal methods and application areas. The programmecommittee re?ects the Congress's international nature, with a membership of 84 leading researchersfrom 38 di erent countries.The comm- tee was divided into 19 tracks, each with its own chair to oversee the reviewing process. Our collective task was a di cult one: there were 259 high-quality s- missions from 35 di erent countries.

Computational Methods for Controller Design (Paperback, 3rd Edition. ed.): Nicola Elia, Munther A. Dahleh Computational Methods for Controller Design (Paperback, 3rd Edition. ed.)
Nicola Elia, Munther A. Dahleh
R1,376 Discovery Miles 13 760 Ships in 18 - 22 working days

The monograph is concerned with computational methods for controller design that allow several typical performance specifications to be directly imposed on a system. The general approach proposed, is applicable to a large class of problems; it is based on posing multi-objective control problems as convex infinite dimensional optimization problems. Particularly interesting and useful are the following methodological as pects of the approach proposed in the monograph. These are: A unified way to pose the problems as generalized linear programs. Duality theory results that characterize the duality relationship for the generalized linear programs arising from multi-objective control problems. A set of tools to analyse the convergence properties of the computational method based on the duality relationship. The complete analysis and extension of methods developed for the L1 problem, for several important multi-objective problems. This book is primarily concerned with multi-objective control problems as convex optimizations on the space of the closed loop maps. However, the issue of deriving exact or approximate solutions is similar when the problems are posed as dynamic games in s tate space. Therefore the problem of finding the state feedback controller that minimizes the worst-case peak-to-peak amplification of the closed loop system, is considered in the last chapter. The objective of this work is to propose generic computation methods that can be used to solve a wide range of multi-objective control problems. Infinite dimensional convex optimization problems are considered, giving the book a broader focus than other competitive titles in this field. This non-exclusive approach will have a wide appeal for scientists and graduate students. They will be able to determine and analyse readily implementable computational methods to derive exact or approximate solutions. Key words for the catalogue index: Controller design, multi objective control, computational methods, linear programming, robust control.USPs: Generic computational methods are proposed - these can be used to solve a wide range of multi-objective control p roblems.A new computational method for the L1 problem is suggested, which is superior to existing approaches and is based on the solution of a mixed objective problem.The reader will greatly benefit from the comprehensive treatment of this topic

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Holding Government Bureaucracies…
Bernard Rosen Hardcover R2,806 R2,540 Discovery Miles 25 400
Geletterdheid in die grondslagfase
I. Joubert, M. Bester, … Paperback R140 Discovery Miles 1 400
Managing Crisis Cities - The New Black…
Bette Woody Hardcover R2,804 R2,538 Discovery Miles 25 380
Language Teaching and Language…
Arthur van Essen, Sake Jager, … Hardcover R4,217 Discovery Miles 42 170
Alien: Isolation
Keith R. A. DeCandido Paperback R236 R221 Discovery Miles 2 210
Satires
Joseph Hall Paperback R501 Discovery Miles 5 010
Clans of the Alphane Moon
Philip K. Dick Paperback  (1)
R402 R373 Discovery Miles 3 730
Loss - Poems To Better Weather The Many…
Donna Ashworth Hardcover  (1)
R288 R262 Discovery Miles 2 620
Big Data for Remote Sensing…
Nilanjan Dey, Chintan Bhatt, … Hardcover R4,011 Discovery Miles 40 110
Steel - The Story of Pittsburgh's Iron…
Dale Richard Perelman Paperback R517 R486 Discovery Miles 4 860

 

Partners