0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (865)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Information Systems - The e-Business Challenge (Hardcover, 2002 ed.): Roland Traunmuller Information Systems - The e-Business Challenge (Hardcover, 2002 ed.)
Roland Traunmuller
R3,024 Discovery Miles 30 240 Ships in 10 - 15 working days

Information Systems: The e-Business Challenge Indisputable, e-Business is shaping the future inspiring a growing range of innovative business models. To bring it to the point: the Internet has redefined the way electronic business is performed. In an electronic supported business all relationships are transformed -may it be a seller-to buyer relationship or a an agency-to-citizen relationship. So for instance in commerce new business models incorporate various activities: promoting and communicating company and product information to a global user base; accepting orders and payments for goods and services; providing ongoing customer support; getting feedback and spurring collaboration for a new product development. There are several ways of further differentiating e-Business such as sketching some diversions on various levels: e-Commerce, e-Government; B2C, B2B, B2G, G2C; Customer Relationship Management, Business Intelligence and so on. Further distinctions may follow divergent criteria such as separating in business stages. Thus particular problem domains emerge. They all state of its own guiding the development of adequate information systems."

Management of Multimedia on the Internet - 4th IFIP/IEEE International Conference on Management of Multimedia Networks and... Management of Multimedia on the Internet - 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2001, Chicago, IL, USA, October 29 - November 1, 2001. Proceedings (Paperback, 2001 ed.)
Ehab S. Al-Shaer, Giovanni Pacifici
R1,670 Discovery Miles 16 700 Ships in 10 - 15 working days

In recent years we have witnessed the explosion of multimedia traffic on the Internet. The availability of high bandwidth connections together with the recent advances in high quality video and audio compression techniques have created a fertile ground for the growth of multimedia applications such as interactive video on demand, collaborative distance learning, and remote medical diagnosis. Furthermore, the availability of low bit rate video and audio applications (e.g., H.263 and G.728) and the proliferation of pervasive devices create a new demand for wireless multimedia communication systems. After a decade or more of research and development in multimedia networking, the research community has learned a number of lessons. First, increasing the capacity of the "best effort" networks and services does not provide an effective and permanent solution for offering a guaranteed Quality of Service (QoS). Second, the integration of service and network management is a key element in providing end to end service management. Third, management techniques for Internet multimedia services must be scalable and adaptive to guarantee QoS and maintain fairness with optimal network resource.

Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Hardcover): James Bone Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Hardcover)
James Bone
R2,456 Discovery Miles 24 560 Ships in 12 - 17 working days

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

The Handbook for Reluctant Database Administrators (Paperback, 1st ed.): Josef Finsel The Handbook for Reluctant Database Administrators (Paperback, 1st ed.)
Josef Finsel
R1,328 R1,135 Discovery Miles 11 350 Save R193 (15%) Ships in 10 - 15 working days

Feeling reluctant?"The Handbook for Reluctant Database Administrators "provides you witha solid grasp of what you'll need to design, build, secure, and maintain a database. Author Josef Finsel writes from an understanding point of view; he also crossed over from programming to database administration. Furthermore, database administrationveteran Francis Stanisci comments throughout the book, sharing insight from his own years of experience.

UML 2001 - The Unified Modeling Language. Modeling Languages, Concepts, and Tools - 4th International Conference, Toronto,... UML 2001 - The Unified Modeling Language. Modeling Languages, Concepts, and Tools - 4th International Conference, Toronto, Canada, October 1-5, 2001. Proceedings (Paperback, 2001 ed.)
Martin Gogolla, Cris Kobryn
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on the Unified Modeling Language, 2001, held in Toronto, Canada, in October 2001.The 33 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 122 abstracts and 102 papers submitted. The papers are organized in topical sections on metamodeling, activity diagrams, OCL, architecture and patterns, analysis and testing, performance and databases, graph transformations, real-time and embedded systems, associations and ontology, statecharts, components, and use cases.

Information Security - 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings (Paperback, 2001... Information Security - 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings (Paperback, 2001 ed.)
George I. Davida, Yair Frankel
R1,778 Discovery Miles 17 780 Ships in 10 - 15 working days

The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Malaga, Spain, on October 1 3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier Lopez and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. Jose M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio Mana, Carlos Maraval, Juan J. Ortega, Jose M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, Universita di Milano; G. R."

Intelligent Memory Systems - Second International Workshop, IMS 2000, Cambridge, MA, USA, November 12, 2000. Revised Papers... Intelligent Memory Systems - Second International Workshop, IMS 2000, Cambridge, MA, USA, November 12, 2000. Revised Papers (Paperback, 2001 ed.)
Frederic T. Chong, Christoforos Kozyrakis, Mark Oskin
R1,562 Discovery Miles 15 620 Ships in 10 - 15 working days

This book presents the thoroughly refereed post-proceedings of the Second International Workshop on Intelligent Memory Systems, IMS 2000, held in Cambridge, MA, USA, in November 2000.The nine revised full papers and six poster papers presented were carefully reviewed and selected from 28 submissions. The papers cover a wide range of topics in intelligent memory computing; they are organized in topical sections on memory technology, processor and memory architecture, applications and operating systems, and compiler technology.

Generative and Component-Based Software Engineering - Third International Conference, GCSE 2001, Erfurt, Germany, September... Generative and Component-Based Software Engineering - Third International Conference, GCSE 2001, Erfurt, Germany, September 9-13, 2001, Proceedings (Paperback, 2001 ed.)
Jan Bosch
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Generative and Component-Based Software Engineering, GCSE 2001, held in Erfurt, Germany, in September 2001.The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on software product lines, aspects, generic and generative approaches, and components and architectures.

Generative and Component-Based Software Engineering - Second International Symposium, GCSE 2000, Erfurt, Germany, October 9-12,... Generative and Component-Based Software Engineering - Second International Symposium, GCSE 2000, Erfurt, Germany, October 9-12, 2000. Revised Papers (Paperback, 2001 ed.)
Greg Butler, Stan Jarzabek
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

These are the proceedings of the second symposium on Generative and C- ponent-Based Software Engineering that was held in Erfurt, Germany, on - tober 9-12, 2000, as part of the Net. Object Days conference. The GCSE s- posium was born in 1999 at the Smalltalk and Java in Industry and Edu- tion Conference (STJA), the precursor to the Net. Object Days conference. The GCSE symposium grew out of a special track on generative programming that was organized by the working group "Generative and Component-Based So- ware Engineering" of the "Gesellschaft fur .. Informatik" FG 2. 1. 9 at STJA in the two years 1997 and 1998. The GCSE symposium covers a wide range of related topics from domain analysis, software system family engineering, and software product lines, to extendible compilers and active libraries. The second GCSE symposium attracted 29 submissions from all over the world. This impressive number demonstrates the international interest in g- erative programming and related ?elds. After a careful review by the program committee, 12 papers were selected for presentation. We are very grateful to the members of the program committee, all of them renowned experts, for their dedication in preparing thorough reviews of the submissions. Special thanks go to Elke Pulvermuller .. , Andreas Speck, Kai B.. ollert, Detlef Streitferdt, and Dirk Heuzeroth, who continued the tradition from GCSE'99 and organized a special conference event, the Young Researchers Workshop (YRW). This workshop provided a unique opportunity for young scientists and Ph. D.

Recent Advances in Intrusion Detection - 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings... Recent Advances in Intrusion Detection - 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings (Paperback, 2001 ed.)
Wenke Lee, Ludovic Me, Andreas Wespi
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Fourth International Workshop on Recent Advances in Intrusion Detection, RAID 2001, held in Davis, CA, USA, in October 2001.The 12 revised full papers presented were carefully reviewed and selected from a total of 55 submissions. The papers are organized in sections on logging, cooperation, anomaly detection, intrusion tolerance, legal aspects and specification-based IDS.

Advances in Learning Software Organizations - Third International Workshop, LSO 2001, Kaiserslautern, Germany, September 12-13,... Advances in Learning Software Organizations - Third International Workshop, LSO 2001, Kaiserslautern, Germany, September 12-13, 2001. Proceedings (Paperback, 2001 ed.)
Klaus-Dieter Althoff, Raimund L. Feldmann, Wolfgang Muller
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Learning Software Organizations, LSO 2001, held in Kaiserslautern, Germany, in September 2001.The twelve revised full papers presented together with an introductory overview, keynote and panel summaries, and three posters were carefully reviewed and selected for inclusion in the book. Among the topics addressed are organizational learning in dynamic domains, knowledge management in software development, Web-based collaborative learning, knowledge management support, software process improvement, Web-based data mining, process-integrated learning, process-centered software engineering education, etc.

Queueing Networks with Discrete Time Scale - Explicit Expressions for the Steady State Behavior of Discrete Time Stochastic... Queueing Networks with Discrete Time Scale - Explicit Expressions for the Steady State Behavior of Discrete Time Stochastic Networks (Paperback, 2001 ed.)
Hans Daduna
R1,287 Discovery Miles 12 870 Ships in 10 - 15 working days

Building on classical queueing theory mainly dealing with single node queueing systems, networks of queues, or stochastic networks has been a field of intensive research over the last three decades. Whereas the first breakthrough in queueing network theory was initiated by problems and work in operations research, the second breakthrough, as well as subsequent major work in the area, was closely related to computer science, particularly to performance analysis of complex systems in computer and communication science.The text reports on recent research and development in the area. It is centered around explicit expressions for the steady behavior of discrete time queueing networks and gives a moderately positive answer to the question of whether there can be a product form calculus in discrete time. Originating from a course given by the author at Hamburg University, this book is ideally suited as a text for courses on discrete time stochastic networks.

Lectures on Formal Methods and Performance Analysis - First EEF/Euro Summer School on Trends in Computer Science Berg en Dal,... Lectures on Formal Methods and Performance Analysis - First EEF/Euro Summer School on Trends in Computer Science Berg en Dal, The Netherlands, July 3-7, 2000. Revised Lectures (Paperback, 2001 ed.)
Ed Brinksma, Holger Hermanns, Joost-Pieter Katoen
R1,703 Discovery Miles 17 030 Ships in 10 - 15 working days

Traditionally, models and methods for the analysis of the functional correctness of reactive systems, and those for the analysis of their performance (and - pendability) aspects, have been studied by di?erent research communities. This has resulted in the development of successful, but distinct and largely unrelated modeling and analysis techniques for both domains. In many modern systems, however, the di?erence between their functional features and their performance properties has become blurred, as relevant functionalities become inextricably linked to performance aspects, e.g. isochronous data transfer for live video tra- mission. During the last decade, this trend has motivated an increased interest in c- bining insights and results from the ?eld of formal methods - traditionally - cused on functionality - with techniques for performance modeling and analysis. Prominent examples of this cross-fertilization are extensions of process algebra and Petri nets that allow for the automatic generation of performance models, the use of formal proof techniques to assess the correctness of randomized - gorithms, and extensions of model checking techniques to analyze performance requirements automatically. We believe that these developments markthe - ginning of a new paradigm for the modeling and analysis of systems in which qualitative and quantitative aspects are studied from an integrated perspective. We are convinced that the further worktowards the realization of this goal will be a growing source of inspiration and progress for both communities.

Cooperative Information Systems - 9th International Conference, CoopIS 2001, Trento, Italy, September 5-7, 2001. Proceedings... Cooperative Information Systems - 9th International Conference, CoopIS 2001, Trento, Italy, September 5-7, 2001. Proceedings (Paperback, 2001 ed.)
Carlo Batini, Fausto Giunchiglia, Paolo Giorgini, Massimo Mecella
R1,715 Discovery Miles 17 150 Ships in 10 - 15 working days

Cooperative Information Systems have emerged as a central concept in a variety of applications, projects, and systems in the new era of e-business. The conference at which the papers in this volume were presented was the ninth international conference on the topic of Cooperative Information Systems (CoopIS 2001), and was held in Trento, Italy on September 5-7, 2001. Like the previous conferences, CoopIS 2001 has been remarkably successful in bringing together representatives of many di?erent ?elds, spanning the entire range of e?ective web-based Cooperative Information Systems, and with interests ranging from industrial experience to original research concepts and results. The 29 papers collected here out of the 79 ones that were submitted, dem- strate well the range of results achieved in several areas such as agent te- nologies, models and architectures, web systems, information integration, m- dleware technologies, federated and multi-database systems. The papers th- selves, however, do not convey the lively excitement of the conference itself, and the continuing spirit of cooperation and communication across disciplines that has been the hallmark of these conferences. We would especially like to thank our keynote speakers: Philip A. Bernstein (Microsoft Research, USA), Edward E. Cobb (BEA Systems, USA), and Ma- izio Lenzerini (Universit'a di Roma "La Sapienza", Italy) for providing a portrait of the best contemporary work in the ?eld. We would also like to thank the many people who made CoopIS 2001 possible.

Knowledge Sharing in Practice (Hardcover, 2002 ed.): M. H. Huysman, D.H. de Wit Knowledge Sharing in Practice (Hardcover, 2002 ed.)
M. H. Huysman, D.H. de Wit
R4,463 Discovery Miles 44 630 Ships in 10 - 15 working days

In this volume organizational learning theory is used to analyse various practices of managing and facilitating knowledge sharing within companies. Experiences with three types of knowledge sharing, namely knowledge acquisition, knowledge reuse, and knowledge creation, at ten large companies are discussed and analyzed. This critical analysis leads to the identification of traps and obstacles when managing knowledge sharing, when supporting knowledge sharing with IT tools, and when organizations try to learn from knowledge sharing practices. The identification of these risks is followed by a discussion of how organizations can avoid them.

This work will be of interest to researchers and practitioners working in organization science and business administration. Also, consultants and organizations at large will find the book useful as it will provide them with insights into how other organizations manage and facilitate knowledge sharing and how potential failures can be prevented.

Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability, Berkeley,... Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings (Paperback, 2001 ed.)
Hannes Federrath
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.

New Approaches in Software Measurement - 10th International Workshop, IWSM 2000, Berlin, Germany, October 4-6, 2000.... New Approaches in Software Measurement - 10th International Workshop, IWSM 2000, Berlin, Germany, October 4-6, 2000. Proceedings (Paperback, 2001 ed.)
Reiner Dumke, Alain Abran
R1,593 Discovery Miles 15 930 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Software Measurement, IWSM 2000, held in Berlin, Germany in October 2000.The 10 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on object-oriented software measurement, software process improvement, function-point-based software measurement, software measurement of special aspects, improving the software measurement process.

Computer Safety, Reliability, and Security - 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October... Computer Safety, Reliability, and Security - 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000 Proceedings (Paperback, 2000 ed.)
Floor Koornneef, Meine Van Der Meulen
R1,703 Discovery Miles 17 030 Ships in 10 - 15 working days

WelcometoRotterdamandtotheInternationalConferenceSafecomp2000,on thereliability,safetyandsecurityofcriticalcomputerapplications. Thisalready marksthe19thyearoftheconference,showingtheundiminishedinterestthe topicelicitsfrombothacademiaandindustry. Safecomphasproventobean excellentplacetomeetandhavediscussions,andwehopethistrendcontinues thisyear. Peopleandorganisationsdependmoreandmoreonthefunctioningofc- puters. Whetherinhouseholdequipment,telecommunicationsystems,o?ce- plications,banking,peoplemovers,processcontrolormedicalsystems,theoft- embeddedcomputersubsystemsaremeanttoletthehostingsystemrealiseits intendedfunctions. Theassuranceofproperfunctioningofcomputersin- pendableapplicationsisfarfromobvious. Themillenniumstartedwiththebug andthefullendorsementoftheframeworkstandardIEC61508. Thevariety ofdependablecomputerapplicationsincreasesdaily,andsodoesthevarietyof risksrelatedtotheseapplications. Theassessmentoftheserisksthereforeneeds re?ectionandpossiblynewapproaches. Thisyear'sSafecompprovidesabroad mixofpapersontheseissues,onprogressmadeindi?erentapplicationdomains andonemergingchallenges. Oneofthespecialtopicsthisyearistransportandinfrastructure. Onewould behardpressedto?ndabetterplacetodiscussthisthaninRotterdam. The reliability,safetyandsecurityofcomputersisofprominentimportancetoRott- dam,asafewexamplesillustrate. Itsharbourdependsonthereliablefunctioning ofcontainerhandlingsystems,onthesafefunctioningofitsradarsystems,and, asofrecently,onthesafeandreliablefunctioningoftheenormousstormsurge barrieratHoekvanHolland. AnewtopicforSafecompis medicalsystems. Theseprogressivelydepend on-embedded-programmableelectronicsystems. Experienceshowsthatthe medicalworldlacksthemethodsforapplyingthesesystemssafelyandreliably. Wewelcomeagroupofpeoplereadytodiscussthistopic,andhope,bydoing so,tocontributetothis?eldofapplicationsofsafe,reliableandsecuresystems. SoftwareprocessimprovementalsorepresentsaspecialtopicofSafecomp 2000. Itprovedtobethemostfruitfulofthethreeintermsofsubmittedpapers. Thereweremanycontributionsfromahostofcountries,whichhadtobespread amongstdi?erentsessiontopics. WewishtothanktheInternationalProgramCommittee'smembers,41in total,fortheire?ortsinreviewingthepapersandfortheirvaluableadvicein organisingthisconference. Wearealsogratefulfortheircontributiontod- tributingcallsforpapersandannouncements. Withouttheirhelptheburdenof organisingthisconferencewouldhavebeenmuchgreater. VI Preface Finally,letusonceagainwelcomeyoutoRotterdam,atrulyinternational cityandhometopeopleofmanynationalities. Wehopeyoutakethetimenot onlytoenjoythisconference,butalsoto?ndyourwayaroundthecity,sinceit surelyhasmuchtoo?er. FloorKoornneef MeinevanderMeulen Table of Contents InvitedPaper TheTenMostPowerfulPrinciplesforQualityin(Softwareand) SoftwareOrganizationsforDependableSystems...1 TomGilb Veri?cationandValidation EmpiricalAssessmentofSoftwareOn-LineDiagnostics UsingFaultInjection...14 JohnNapier,JohnMayandGordonHughes Speeding-UpFaultInjectionCampaignsinVHDLModels...27 B. Parrotta,M. Rebaudengo,M. SonzaReordaandM. Violante Speci?cationandVeri?cationofaSafetyShellwithStatechartsand ExtendedTimedGraphs...37 JanvanKatwijk,HansToetenel,Abd-El-KaderSahraoui,EricAnderson andJanuszZalewski ValidationofControlSystemSpeci?cationswithAbstractPlantModels...53 WenhuiZhang AConstantPerturbationMethodforEvaluation ofStructuralDiversityinMultiversionSoftware...63 LupingChen,JohnMayandGordonHughes ExpertError:TheCaseofTrouble-ShootinginElectronics...74 DenisBesnard TheSafetyManagementofData-DrivenSafety-RelatedSystems ...86 A. G. Faulkner,P. A. Bennett,R. H. Pierce,I. H. A. Johnston andN. Storey SoftwareSupportforIncidentReportingSystems inSafety-CriticalApplications...96 ChrisJohnson SoftwareProcessImprovement ADependability-ExplicitModelfortheDevelopment ofComputingSystems...107 MohamedKaan iche,Jean-ClaudeLaprieandJean-PaulBlanquart VIII Table ofContents DerivingQuanti?edSafetyRequirementsinComplexSystems ...117 PeterA. Lindsay,JohnA. McDermidandDavidJ. Tombs ImprovingSoftwareDevelopmentbyUsing SafeObjectOrientedDevelopment:OTCD...131 XavierM'ehautandPierreMor'ere ASafetyLicensablePESforSIL4Applications...141 WolfgangA. Halang,PeterVogrinandMatja?zColnari?c SafetyandSecurityIssuesinElectricPowerIndustry ...151 ? Zdzis lawZurakowski DependabilityofComputerControlSystemsinPowerPlants ...165 Cl'audiaAlmeida,AlbertoArazo,YvesCrouzetandKaramaKanoun AMethodofAnalysisofFaultTreeswithTimeDependencies ...176 JanMagottandPawe lSkrobanek Formal Methods AFormalMethodsCaseStudy:UsingLight-WeightVDM fortheDevelopmentofaSecuritySystemModule...187 GeorgDroschl,WalterKuhn,GeraldSonneckandMichaelThuswald FormalMethods:TheProblemIsEducation...198 ThierryScheurer FormalMethodsDi?usion:PastLessonsandFutureProspects...211 R. Bloom?eld,D. Craigen,F. Koob,M. UllmannandS. Wittmann InvitedPaper SafeTech:AControlOrientedViewpoint...227 MaartenSteinbuch SafetyGuidelines,StandardsandCerti?cation DerivationofSafetyTargetsfortheRandomFailure ofProgrammableVehicleBasedSystems...240 RichardEvansandJonathanMo?ett IEC61508-ASuitableBasisfortheCerti?cation ofSafety-CriticalTransport-InfrastructureSystems??...250 DerekFowlerandPhilBennett Table of Contents IX HardwareAspects AnApproachtoSoftwareAssistedRecovery fromHardwareTransientFaultsforRealTimeSystems...264 D. BasuandR. Paramasivam ProgrammableElectronicSystemDesign&Veri?cationUtilizingDFM...275 MichelHoutermans,GeorgeApostolakis,AarnoutBrombacher andDimitriosKarydas SIMATICS7-400F/FH:Safety-RelatedProgrammableLogicController...286 AndreasSchenk SafetyAssessmentI AssessmentoftheReliabilityofFault-TolerantSoftware: ABayesianApproach...294 BevLittlewood,PeterPopovandLorenzoStrigini EstimatingDependabilityofProgrammableSystemsUsingBBNs...309 BjornAxelGran,GustavDahll,SiegfriedEisinger,EivindJ. Lund, JanGerhardNorstrom,PeterStrockaandBrittJ. Ystanes DesignforSafety ImprovementsinProcessControlDependability throughInternetSecurityTechnology...321 FerdinandJ. Dafelmair ASurveyonSafety-CriticalMulticastNetworking ...333 JamesS. PascoeandR. J. Loader InvitedPaper CausalReasoningaboutAircraftAccidents...344 PeterB. Ladkin Transport&Infrastructure ControllingRequirementsEvolution:AnAvionicsCaseStudy...361 StuartAndersonandMassimoFelici HAZOPAnalysisofFormalModels ofSafety-CriticalInteractiveSystems...

Cooperative Information Systems - 7th International Conference, CoopIS 2000 Eilat, Israel, September 6-8, 2000 Proceedings... Cooperative Information Systems - 7th International Conference, CoopIS 2000 Eilat, Israel, September 6-8, 2000 Proceedings (Paperback, 2000 ed.)
Opher Etzion, Peter Scheuermann
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

Cooperation among systems has gained substantial importance in recent years: electronic commerce virtual enterprises and the middleware paradigm are just some examples in this area. CoopIS is a multi-disciplinary conference, which deals with all aspects of cooperation. The relevant disciplines are: collaborative work, distributed databases, distributed computing, electronic commerce, human-computer interaction, multi-agent systems, information retrieval, and workflow systems. The CoopIS series provides a forum for well-known researchers who are drawn by the stature and the tradition of these conference series and has a leading role in shaping the future of the cooperative information systems area. CoopIS 2000 is the seventh conference in the series and the fifth conference organized by the International Foundation on Cooperative Information Systems (IFCIS). It is sponsored by the IFCIS, the IBM Research Laboratory in Haifa and Compaq, Tandem labs Israel. It replaces the former international workshops on Interoperability in Multidatabase systems (IMS) and the conference series on Cooperative Information Systems (CoopIS & ICICIS). In response to the call for papers 74 papers were submitted. Each of them was reviewed by at least three reviewers, and at the end of this process 24 papers were accepted for presentation at the conference. Six additional papers were selected for short presentations. In addition the conference includes two panels, two keynote speakers (Professor Calton Pu from Georgia Tech and Professor Sheizaf Rafaeli from Haifa University) and one tutorial. A special issue of the International Journal of Cooperative Information Systems will follow. August 2000 Opher Etzion & Peter Scheuermann

Hardware Implementation of Intelligent Systems (Hardcover, 2001 ed.): Horia-Nicolai Teodorescu, Abraham Kandel Hardware Implementation of Intelligent Systems (Hardcover, 2001 ed.)
Horia-Nicolai Teodorescu, Abraham Kandel
R3,044 Discovery Miles 30 440 Ships in 10 - 15 working days

Intelligent systems are now being used more commonly than in the past. These involve cognitive, evolving and artificial-life, robotic, and decision making systems, to name a few. Due to the tremendous speed of development, on both fundamental and technological levels, it is virtually impossible to offer an up-to-date, yet comprehensive overview of this field. Nevertheless, the need for a volume presenting recent developments and trends in this domain is huge, and the demand for such a volume is continually increasing in industrial and academic engineering 1 communities. Although there are a few volumes devoted to similar issues, none offer a comprehensive coverage of the field; moreover they risk rapidly becoming obsolete. The editors of this volume cannot pretend to fill such a large gap. However, it is the editors' intention to fill a significant part of this gap. A comprehensive coverage of the field should include topics such as neural networks, fuzzy systems, neuro-fuzzy systems, genetic algorithms, evolvable hardware, cellular automata-based systems, and various types of artificial life-system implementations, including autonomous robots. In this volume, we have focused on the first five topics listed above. The volume is composed of four parts, each part being divided into chapters, with the exception of part 4. In Part 1, the topics of "Evolvable Hardware and GAs" are addressed. In Chapter 1, "Automated Design Synthesis and Partitioning for Adaptive Reconfigurable Hardware," Ranga Vemuri and co-authors present state-of-the-art adaptive architectures, their classification, and their applications."

Scheduling Computer and Manufacturing Processes (Hardcover, 2nd ed. 2001): Jacek Blazewicz, Klaus H. Ecker, Erwin Pesch, Gunter... Scheduling Computer and Manufacturing Processes (Hardcover, 2nd ed. 2001)
Jacek Blazewicz, Klaus H. Ecker, Erwin Pesch, Gunter Schmidt, Jan Weglarz
R4,639 Discovery Miles 46 390 Ships in 10 - 15 working days

This book provides a theoretical and application oriented analysis of deterministic scheduling problems arising in computer and manufacturing environments. In such systems processors (machines) and possibly other resources are to be allocated among tasks in such a way that certain scheduling objectives are met. Various scheduling problems are discussed where different problem parameters such as task processing times, urgency weights, arrival times, deadlines, precedence constraints, and processor speed factor are involved. Polynomial and exponential time optimization algorithms as well as approximation and heuristic approaches (including tabu search, simulated annealing, genetic algorithms, and ejection chains) are presented and discussed. Moreover, resource-constrained, imprecise computation, flexible flow shop and dynamic job shop scheduling, as well as flexible manufacturing systems, are considered.

Policies for Distributed Systems and Networks - International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001... Policies for Distributed Systems and Networks - International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001 Proceedings (Paperback)
Morris Sloman, Jorge Lobo, Emil C. Lupu
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Workshop on Policies for Distributed Systems and Networks, POLICY 2001, held in Bristol, UK in January 2001. The 16 revised full papers presented were carefully reviewed and selected from 43 submissions. Among the topics covered are abstractions and notations for policy specifications, security policies, access control, implementations, applications, quality of service, and management.

Relationships in the Organization of Knowledge (Hardcover, 2001 ed.): A. Bean, R. Green Relationships in the Organization of Knowledge (Hardcover, 2001 ed.)
A. Bean, R. Green
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

Relationships abound in the library and information science (LIS) world. Those relationships may be social in nature, as, for instance, when we deal with human relationships among library personnel or relationships (i. e. , "public relations") between an information center and its clientele. The relationships may be educational, as, for example, when we examine the relationship between the curriculum of an accredited school and the needs of the work force it is preparing students to join. Or the relationships may be economic, as when we investigate the relationship between the cost of journals and the frequency with which they are cited. Many of the relationships of concern to us reflect phenomena entirely internal to the field: the relationship between manuscript collections, archives, and special collections; the relationship between end user search behavior and the effectiveness of searches; the relationship between access to and use of information resources; the relationship between recall and precision; the relationship between various bibliometric laws; etc. The list of such relationships could go on and on. The relationships addressed in this volume are restricted to those involved in the organization of recorded knowledge, which tend to have a conceptual or semantic basis, although statistical means are sometimes used in their discovery.

Software Architectures for Product Families - International Workshop IW-SAPF-3. Las Palmas de Gran Canaria, Spain, March 15-17,... Software Architectures for Product Families - International Workshop IW-SAPF-3. Las Palmas de Gran Canaria, Spain, March 15-17, 2000 Proceedings (Paperback, 2000 ed.)
Frank van der Linden
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Software Architectures for Product Families IW-SAPF-3, held in Las Palmas de Gran Canaria, Spain in March 2000. The 24 revised full papers presented together with an introduction and two surveys were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on product family practice, business, product family concepts, product family methods, evolution, and product family techniques.

High-Performance Computing and Networking - 8th International Conference, HPCN Europe 2000 Amsterdam, The Netherlands, May... High-Performance Computing and Networking - 8th International Conference, HPCN Europe 2000 Amsterdam, The Netherlands, May 8-10, 2000 Proceedings (Paperback, 2000 ed.)
Marian Bubak, Roy Williams, Hamideh Afsarmanesh, Bob Hertzberger
R3,002 Discovery Miles 30 020 Ships in 10 - 15 working days

This volume contains the proceedings of the international HPCN Europe 2000 event which was held in the Science and Technology Centre Watergraafsmeer, Amsterdam, the Netherlands, May 8-10, 2000. HPCN (High Performance Computing and Networking)Europeeventwas organized for the r st time in 1993 in Amsterdam as the result of several i- tiatives in Europe, the United States of America, and Japan. Succeeding HPCN events were held in Munich (1994), Milan (1995), Brussels (1996), and Vienna (1997), returning to Amsterdam in 1998 to stay. The HPCN event keeps growing and advancing every year, and this year the event consisted of the scientic conference, focused workshops, and several associated events. Theplenary lectures werepresented bysix renowned speakers: { Henk van der Vorst, University of Utrecht, The Netherlands: Giant Eig- problems within Reach, { WolfgangGentzsch, CTO, GridwareInc., Germany: The Information Power Grid is Changing our World, { Bernard Lecussan, SupAero and ONERA/CERT/DTIM, France: Irregular Application Computations on a Cluster of Workstations, { Miguel Albrecht, European Southern Observatory, Garching, Germany: Technologies for Mining Terabytes of Data, { HansMeinhardt, Max-Planck-Institut,Germany: The Algorithmic Beauty of Sea Shells,and { IngoAugustin,CERN,Geneva,Switzerland: Towards Multi-petabyte Storage Facilities. Theconference consisted ofparalleltrackspresenting 52selected papers, andone track presenting 25 posters. The areas covered in the conference include: Ind- trial and General End-User Applications of HPCN, Computational and C- puter Sciences, and this year the scope of the conference was further expanded by an additional area to emphasize the information management aspects, and the importance of the web-based cooperative application infrastructures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lives of the Archbishops of Canterbury…
Walter F. Hook Paperback R688 Discovery Miles 6 880
Count My Lies
Sophie Stava Paperback R355 R299 Discovery Miles 2 990
Flying Angels
Danielle Steel Paperback R413 Discovery Miles 4 130
Cut-Out Dress (Black)
R399 Discovery Miles 3 990
The List
Barry Gilder Paperback R340 Discovery Miles 3 400
Red Tide
Irma Venter Paperback R380 R356 Discovery Miles 3 560
Canary
Onke Mazibuko Paperback R320 R270 Discovery Miles 2 700
Twelve Secrets
Robert Gold Paperback R400 R369 Discovery Miles 3 690
The Unicorn Baby - Debunking 10 Myths Of…
Roxanne Atkinson Paperback R265 R237 Discovery Miles 2 370
Memoirs of the Court of England During…
John Heneage Jesse Paperback R725 Discovery Miles 7 250

 

Partners