![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Systems analysis & design
This book constitutes the proceedings of the 39th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2019, held in Copenhagen, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 15 full and 3 short papers presented were carefully reviewed and selected from 42 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2017, held in Porto, Portugal, in April 2017. The 12 full papers presented were carefully reviewed and selected from 102 submissions. The mission of ENASE is to be a prime international forum to discuss and publish research findings and IT industry experiences with relation to the evaluation of novel approaches to software engineering. The conference acknowledges necessary changes in systems and software thinking due to contemporary shifts of computing paradigm to e-services, cloud computing, mobile connectivity, business processes, and societal participation.
This book discusses risk management as it applies to problem-solving for simple, complex and wicked problems faced by policy creators and implementors, project managers and systems engineers in the context of policies, large engineering projects (LEPs), projects and systems. When applying systems thinking to risk management, it can be seen that risk management applies to almost every action taken in daily life. This book: Introduces the systems approach of integrating risk management into policy creation and implementation, project management and systems engineering, such as the risk framework and the Firm Fixed Price (FFP) contract with penalties and bonuses. Introduces a number of out-of-the box concepts building on the application of the systems thinking tools in the system thinker's toolbox. Points out that integrating risk management into policy and project management and systems engineering is just good management and engineering practice. Discusses the flow of risk in a policy from creation through implementation via LEPs and simpler projects, identifying where risks arise and where they should be dealt with. Presents the risks in the relationship between policy creation, implementation, project management and systems engineering. Discusses risks throughout the policy implementation process and shows how the nature of risks changes from political to financial to technological as implementation proceeds. Discusses managing complexity and specifies the minimum number of elements in a system for it to be defined as, and managed as, complex. Points out that in most instances the traditionally ignored major implementation risk is that of poor performance by personnel. Shows how to proactively incorporate prevention into planning in order to prevent risks, as well as how to mitigate them when they occur.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Joint Conference on Software Technologies, ICSOFT 2017, held in Madrid, Spain, in July 2017. The 17 revised full papers and 24 short papers presented were carefully reviewed and selected from 85 submissions. The topics covered in the papers include: software quality and metrics; software testing and maintenance; development methods and models; systems security; dynamic software updates; systems integration; business process modelling; intelligent problem solving; multi-agent systems; and solutions involving big data, the Internet of Things and business intelligence.
This book constitutes the refereed proceedings of the 33rd International Conference, ISC High Performance 2018, held in Frankfurt, Germany, in June 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 81 submissions. The papers cover the following topics: Resource Management and Energy Efficiency; Performance Analysis and Tools; Exascale Networks; Parallel Algorithms.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. Aside from the technical paper sessions the book is organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
This book constitutes the refereed proceedings of the 22nd International Conference on Theory and Applications of Satisfiability Testing, SAT 2019, held in Lisbon, Portugal, UK, in July 2019. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 64 submissions. The papers address different aspects of SAT interpreted in a broad sense, including (but not restricted to) theoretical advances (such as exact algorithms, proof complexity, and other complexity issues), practical search algorithms, knowledge compilation, implementation-level details of SAT solvers and SAT-based systems, problem encodings and reformulations, applications (including both novel application domains and improvements to existing approaches), as well as case studies and reports on findings based on rigorous experimentation.
This book constitutes the proceedings of the 18th International Conference on Software and Systems Reuse, ICSR 2019, held in Cincinnati, Ohio, USA in June 2019. The 13 research papers included in this book were carefully reviewed and selected from 32 submissions. In addition, 3 industry innovation papers are included. The papers were organized in topical sections named: software reuse practice; software product line and requirements reuse; reuse and design and evolution; intelligent software reuse; and domain-specific software development.
This book constitutes the proceedings of the 21th International Conference on Coordination Models and Languages, COORDINATION 2019, held in Kongens Lyngby, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 15 full papers included in this volume were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections named: computational models; tools; exploring new frontiers; and coordination patterns.
This book constitutes the refereed proceedings of the 11th International Andrei P. Ershov Informatics Conference, PSI 2017, held in Moscow, Russia, in June 2017. The 31 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover various topics related to the foundations of program and system development and analysis, programming methodology and software engineering and information technologies.
This book contains extended versions of the best papers presented at the 13th International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications, ICTERI 2017, held in Kyiv, Ukraine, in May 2017. The 11 revised full papers included in this volume were carefully reviewed and selected from 151 initial submissions during several rounds of reviewing. The papers are organized in the following topical sections: modeling and theoretical frameworks; ICT in teaching, learning, and education management; and ICT evaluation and applications.
For undergraduate systems analysis and design courses. A practical and modern approach to systems analysis and design Kendall and Kendall's Systems Analysis and Design, Global Edition, 10th Edition concisely presents the latest systems development methods, tools, and techniques to students in an engaging and easy-to-understand manner. The 10th Edition reflects the rapidly changing face of the IS field, with new and advanced features integrated throughout - including additional coverage of security and privacy issues, and innovative materials on new developments such as designing virtual reality and intelligent personal assistants.
This volume contains a record of some of the lectures and seminars delivered at the Third International School on Engineering Trustworthy Software Systems (SETSS 2017), held in April 2017 at Southwest University in Chongqing, China. The six contributions included in this volume provide an overview of leading-edge research in methods and tools for use in computer system engineering. They have been distilled from six original courses delivered at the school on topics such as: rely/guarantee thinking; Hoare-style specification and verification of object-oriented programs with JML; logic, specification, verification, and interactive proof; software model checking with Automizer; writing programs and proofs; engineering self-adaptive software-intensive systems; and with an additional contribution on the challenges for formal semantic description. The material is useful for postgraduate students, researchers, academics, and industrial engineers, who are interested in the theory and practice of methods and tools for the design and programming of trustworthy software systems.
This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.
This book constitutes the proceedings of the 38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2018, held in Madrid, Spain, in June 2018, as part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018. The 10 full papers presented were carefully reviewed and selected from 28 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2018, held in St. Malo, France, in September 2018. The 21 full and 6 short papers plus 2 invited talks presented in this volume were carefully reviewed and selected from 52 submissions. The contributions were organized in topical sections named: on ad-hoc, mobile and wireless sensor, networks and computing.
This book constitutes the post-conference proceedings of the 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016, held in Paris, France, in October 2016. The 22 full papers and 8 short papers presented were carefully reviewed and selected from 58 submissions. They present the most recent innovations, trends, results, experiences and concerns in selected perspectives of critical information infrastructure protection covering the range from small-scale cyber-physical systems security via information infrastructures and their interaction with national and international infrastructures.
This book constitutes the proceedings of the 15th Asian Symposium on Programming Languages and Systems, APLAS 2017, held in Suzhou, China, in November 2017. The 24 papers presented in this volume were carefully reviewed and selected from 56 submissions. They were organized in topical sections named: security; heap and equivalence reasoning; concurrency and verification; domain-specific languages; semantics; and numerical reasoning. The volume also contains two invited talks in full-paper length.
This book constitutes the proceedings of the 16th International Conference on Information Technologies and Mathematical Modelling, ITMM 2017, held in Kazan, Russia, in September/October 2017. The 31 papers presented in this volume were carefully reviewed and selected from 85 submissions. The conference covers various aspects of mathematical modeling and information technologies, focusing on probabilistic methods and models, queueing theory and communication networks.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication.
This book constitutes the refereed proceedings of the 6th International Conference on Big Data analytics, BDA 2018, held in Warangal, India, in December 2018. The 29 papers presented in this volume were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections named: big data analytics: vision and perspectives; financial data analytics and data streams; web and social media data; big data systems and frameworks; predictive analytics in healthcare and agricultural domains; and machine learning and pattern mining.
This volume constitutes the refereed proceedings of the 24th EuroSPI conference, held in Ostrava, Czech Republic, in September 2017.The 56 revised full papers presented were carefully reviewed and selected from 97 submissions. They are organized in topical sections on SPI and VSEs, SPI and process models, SPI and safety, SPI and project management, SPI and implementation, SPI issues, SPI and automotive, selected key notes and workshop papers, GamifySPI, SPI in Industry 4.0, best practices in implementing traceability, good and bad practices in improvement, safety and security, experiences with agile and lean, standards and assessment models, team skills and diversity strategies. |
You may like...
Cases on Lean Thinking Applications in…
Eduardo Guilherme Satolo, Robisom Damasceno Calado
Hardcover
R5,991
Discovery Miles 59 910
Advances in Non-volatile Memory and…
Yoshio Nishi, Blanka Magyari-Kope
Paperback
R4,593
Discovery Miles 45 930
Handbook of Research on 5G Networks and…
Augustine O Nwajana, Isibor Kennedy Ihianle
Hardcover
R7,962
Discovery Miles 79 620
Loose Leaf for Fundamentals of Electric…
Charles Alexander, Matthew Sadiku
Loose-leaf
R5,176
Discovery Miles 51 760
Implementing Data Analytics and…
Chintan Bhatt, Neeraj Kumar, …
Hardcover
R5,931
Discovery Miles 59 310
|