0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (825)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Queueing Networks with Discrete Time Scale - Explicit Expressions for the Steady State Behavior of Discrete Time Stochastic... Queueing Networks with Discrete Time Scale - Explicit Expressions for the Steady State Behavior of Discrete Time Stochastic Networks (Paperback, 2001 ed.)
Hans Daduna
R1,191 Discovery Miles 11 910 Ships in 18 - 22 working days

Building on classical queueing theory mainly dealing with single node queueing systems, networks of queues, or stochastic networks has been a field of intensive research over the last three decades. Whereas the first breakthrough in queueing network theory was initiated by problems and work in operations research, the second breakthrough, as well as subsequent major work in the area, was closely related to computer science, particularly to performance analysis of complex systems in computer and communication science.The text reports on recent research and development in the area. It is centered around explicit expressions for the steady behavior of discrete time queueing networks and gives a moderately positive answer to the question of whether there can be a product form calculus in discrete time. Originating from a course given by the author at Hamburg University, this book is ideally suited as a text for courses on discrete time stochastic networks.

Management of Multimedia on the Internet - 5th IFIP/IEEE International Conference on Management of Multimedia Networks and... Management of Multimedia on the Internet - 5th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2002, Santa Barbara, CA, USA, October 6-9, 2002. Proceedings (Paperback, 2002 ed.)
Kevin C. Almeroth, Masum Z. Hasan
R1,535 Discovery Miles 15 350 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th IFIP/IEEE International Conference on the Management of Multimedia Networks and Services, MMNS 2002, held in Santa Barbara, CA, USA, in October 2002.The 27 revised full papers presented were carefully reviewed and selected from a total of 76 submissions. The papers are organized in topical sections on service management, management of wireless multimedia, bandwidth sharing protocols, distributed video architectures, management systems, differentiated network services, user level traffic adaptation, and multicast congestion control.

Cooperative Information Systems - 9th International Conference, CoopIS 2001, Trento, Italy, September 5-7, 2001. Proceedings... Cooperative Information Systems - 9th International Conference, CoopIS 2001, Trento, Italy, September 5-7, 2001. Proceedings (Paperback, 2001 ed.)
Carlo Batini, Fausto Giunchiglia, Paolo Giorgini, Massimo Mecella
R1,586 Discovery Miles 15 860 Ships in 18 - 22 working days

Cooperative Information Systems have emerged as a central concept in a variety of applications, projects, and systems in the new era of e-business. The conference at which the papers in this volume were presented was the ninth international conference on the topic of Cooperative Information Systems (CoopIS 2001), and was held in Trento, Italy on September 5-7, 2001. Like the previous conferences, CoopIS 2001 has been remarkably successful in bringing together representatives of many di?erent ?elds, spanning the entire range of e?ective web-based Cooperative Information Systems, and with interests ranging from industrial experience to original research concepts and results. The 29 papers collected here out of the 79 ones that were submitted, dem- strate well the range of results achieved in several areas such as agent te- nologies, models and architectures, web systems, information integration, m- dleware technologies, federated and multi-database systems. The papers th- selves, however, do not convey the lively excitement of the conference itself, and the continuing spirit of cooperation and communication across disciplines that has been the hallmark of these conferences. We would especially like to thank our keynote speakers: Philip A. Bernstein (Microsoft Research, USA), Edward E. Cobb (BEA Systems, USA), and Ma- izio Lenzerini (Universit'a di Roma "La Sapienza", Italy) for providing a portrait of the best contemporary work in the ?eld. We would also like to thank the many people who made CoopIS 2001 possible.

Evaluation of Cross-Language Information Retrieval Systems - Second Workshop of the Cross-Language Evaluation Forum, CLEF 2001,... Evaluation of Cross-Language Information Retrieval Systems - Second Workshop of the Cross-Language Evaluation Forum, CLEF 2001, Darmstadt, Germany, September 3-4, 2001. Revised Papers (Paperback, 2002 ed.)
Martin Braschler, Julio Gonzalo, Michael Kluck
R2,911 Discovery Miles 29 110 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the Second Workshop of the Cross-Language Evaluation Forum, CLEF 2001, held in Darmstadt, Germany in September 2001.The 35 revised full papers presented together with two introductory survey articles and a comprehensive appendix were carefully improved during the round of reviewing and selections. The papers are organized in topical sections on systems evaluation experiments, mainly cross-language, monolingual experiments, interactive issues, and evaluation issues and results.

Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability, Berkeley,... Designing Privacy Enhancing Technologies - International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings (Paperback, 2001 ed.)
Hannes Federrath
R1,467 Discovery Miles 14 670 Ships in 18 - 22 working days

Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.

Managing Software Quality - A Measurement Framework for Assessment and Prediction (Paperback, Softcover reprint of the original... Managing Software Quality - A Measurement Framework for Assessment and Prediction (Paperback, Softcover reprint of the original 1st ed. 2002)
Richard E. Nance, James D. Arthur
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

What should be every software organization's primary goal? Managing Software Quality. Producing and sustaining the high quality of products and processes in evolutionary systems are at the core of software engineering, and it is only through a comprehensive measurement program that a successful outcome can be assured. Cost and budget limitations, schedule due dates, all represent systems engineering constraints which impinge on the degree to which software development and maintenance professional can achieve maximum quality. Richard Nance and James Arthur's guide to managing software quality goes beyond the usual answers to the "why" and "what" questions generally provided in the standards documents. They not only look at the "how to" in their focus of the measurement of software quality, but also come up with specific suggestions to the pressing needs of practising software engineers, quality assurance engineers and software and project managers."This is one of the few books in this area that addresses the 'quality' aspect based upon the important aspect of documentation. In addition, the book provides a basis for not only the software manager concerned with measurement implementation, but also the researcher in identifying the current state of the art and practice. This will be a key reference guide for anyone that is concerned with developing quality software."(William H Farr, PhD, Naval Surface Warfare Center Dahlgren Division)About the Authors: Research motivated by problems arising in large, complex software systems is what stimulates Richard Nance. His collaboration with the U.S. Navy on major software-intensive programs spans over 30 years. James Arthur is an Associate Professor of Computer Science at Virginia Tech.

Object Modeling with the OCL - The Rationale behind the Object Constraint Language (Paperback, 2002 ed.): Tony Clark, Jos Warmer Object Modeling with the OCL - The Rationale behind the Object Constraint Language (Paperback, 2002 ed.)
Tony Clark, Jos Warmer
R1,492 Discovery Miles 14 920 Ships in 18 - 22 working days

As part of the UML standard OCL has been adopted by both professionals in industry and by academic researchers and is one of the most widely used languages for expressing object-oriented system properties. This book contains key contributions to the development of OCL. Most papers are developments of work reported at different conferences and workshops. This unique compilation addresses many important issues faced by advanced professionals and researchers in object modeling like e.g. real-time constraints, type checking, and constraint modeling.

Software Product-Family Engineering - 4th International Workshop, PFE 2001 Bilbao, Spain, October 3-5, 2001 Revised Papers... Software Product-Family Engineering - 4th International Workshop, PFE 2001 Bilbao, Spain, October 3-5, 2001 Revised Papers (Paperback, 2002 ed.)
Frank van der Linden
R1,566 Discovery Miles 15 660 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Product Family Engineering, PFE 2001, held in Bilbao, Spain, in October 2001.The 31 revised full papers presented together with an introduction and six session reports were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on product issues, process issues, community issues, platform and quality solutions, diversity solutions, product validation, and process validation.

Information Security - 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings (Paperback, 2001... Information Security - 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings (Paperback, 2001 ed.)
George I. Davida, Yair Frankel
R1,644 Discovery Miles 16 440 Ships in 18 - 22 working days

The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Malaga, Spain, on October 1 3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier Lopez and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their contribution to the success of the conference. Jose M. Troya was the Conference Chair. The General Co chairs were assisted with local arrangements by Antonio Mana, Carlos Maraval, Juan J. Ortega, Jose M. Sierra, and Miguel Soriano. This was the first year that the conference accepted electronic submissions. Many thanks to Dawn Gibson for assisting in developing and maintaining the electronic submission servers. The conference received 98 submissions of which 37 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The Program Committee consisted of Elisa Bertino, Universita di Milano; G. R."

Computer Safety, Reliability, and Security - 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October... Computer Safety, Reliability, and Security - 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000 Proceedings (Paperback, 2000 ed.)
Floor Koornneef, Meine Van Der Meulen
R1,575 Discovery Miles 15 750 Ships in 18 - 22 working days

WelcometoRotterdamandtotheInternationalConferenceSafecomp2000,on thereliability,safetyandsecurityofcriticalcomputerapplications. Thisalready marksthe19thyearoftheconference,showingtheundiminishedinterestthe topicelicitsfrombothacademiaandindustry. Safecomphasproventobean excellentplacetomeetandhavediscussions,andwehopethistrendcontinues thisyear. Peopleandorganisationsdependmoreandmoreonthefunctioningofc- puters. Whetherinhouseholdequipment,telecommunicationsystems,o?ce- plications,banking,peoplemovers,processcontrolormedicalsystems,theoft- embeddedcomputersubsystemsaremeanttoletthehostingsystemrealiseits intendedfunctions. Theassuranceofproperfunctioningofcomputersin- pendableapplicationsisfarfromobvious. Themillenniumstartedwiththebug andthefullendorsementoftheframeworkstandardIEC61508. Thevariety ofdependablecomputerapplicationsincreasesdaily,andsodoesthevarietyof risksrelatedtotheseapplications. Theassessmentoftheserisksthereforeneeds re?ectionandpossiblynewapproaches. Thisyear'sSafecompprovidesabroad mixofpapersontheseissues,onprogressmadeindi?erentapplicationdomains andonemergingchallenges. Oneofthespecialtopicsthisyearistransportandinfrastructure. Onewould behardpressedto?ndabetterplacetodiscussthisthaninRotterdam. The reliability,safetyandsecurityofcomputersisofprominentimportancetoRott- dam,asafewexamplesillustrate. Itsharbourdependsonthereliablefunctioning ofcontainerhandlingsystems,onthesafefunctioningofitsradarsystems,and, asofrecently,onthesafeandreliablefunctioningoftheenormousstormsurge barrieratHoekvanHolland. AnewtopicforSafecompis medicalsystems. Theseprogressivelydepend on-embedded-programmableelectronicsystems. Experienceshowsthatthe medicalworldlacksthemethodsforapplyingthesesystemssafelyandreliably. Wewelcomeagroupofpeoplereadytodiscussthistopic,andhope,bydoing so,tocontributetothis?eldofapplicationsofsafe,reliableandsecuresystems. SoftwareprocessimprovementalsorepresentsaspecialtopicofSafecomp 2000. Itprovedtobethemostfruitfulofthethreeintermsofsubmittedpapers. Thereweremanycontributionsfromahostofcountries,whichhadtobespread amongstdi?erentsessiontopics. WewishtothanktheInternationalProgramCommittee'smembers,41in total,fortheire?ortsinreviewingthepapersandfortheirvaluableadvicein organisingthisconference. Wearealsogratefulfortheircontributiontod- tributingcallsforpapersandannouncements. Withouttheirhelptheburdenof organisingthisconferencewouldhavebeenmuchgreater. VI Preface Finally,letusonceagainwelcomeyoutoRotterdam,atrulyinternational cityandhometopeopleofmanynationalities. Wehopeyoutakethetimenot onlytoenjoythisconference,butalsoto?ndyourwayaroundthecity,sinceit surelyhasmuchtoo?er. FloorKoornneef MeinevanderMeulen Table of Contents InvitedPaper TheTenMostPowerfulPrinciplesforQualityin(Softwareand) SoftwareOrganizationsforDependableSystems...1 TomGilb Veri?cationandValidation EmpiricalAssessmentofSoftwareOn-LineDiagnostics UsingFaultInjection...14 JohnNapier,JohnMayandGordonHughes Speeding-UpFaultInjectionCampaignsinVHDLModels...27 B. Parrotta,M. Rebaudengo,M. SonzaReordaandM. Violante Speci?cationandVeri?cationofaSafetyShellwithStatechartsand ExtendedTimedGraphs...37 JanvanKatwijk,HansToetenel,Abd-El-KaderSahraoui,EricAnderson andJanuszZalewski ValidationofControlSystemSpeci?cationswithAbstractPlantModels...53 WenhuiZhang AConstantPerturbationMethodforEvaluation ofStructuralDiversityinMultiversionSoftware...63 LupingChen,JohnMayandGordonHughes ExpertError:TheCaseofTrouble-ShootinginElectronics...74 DenisBesnard TheSafetyManagementofData-DrivenSafety-RelatedSystems ...86 A. G. Faulkner,P. A. Bennett,R. H. Pierce,I. H. A. Johnston andN. Storey SoftwareSupportforIncidentReportingSystems inSafety-CriticalApplications...96 ChrisJohnson SoftwareProcessImprovement ADependability-ExplicitModelfortheDevelopment ofComputingSystems...107 MohamedKaan iche,Jean-ClaudeLaprieandJean-PaulBlanquart VIII Table ofContents DerivingQuanti?edSafetyRequirementsinComplexSystems ...117 PeterA. Lindsay,JohnA. McDermidandDavidJ. Tombs ImprovingSoftwareDevelopmentbyUsing SafeObjectOrientedDevelopment:OTCD...131 XavierM'ehautandPierreMor'ere ASafetyLicensablePESforSIL4Applications...141 WolfgangA. Halang,PeterVogrinandMatja?zColnari?c SafetyandSecurityIssuesinElectricPowerIndustry ...151 ? Zdzis lawZurakowski DependabilityofComputerControlSystemsinPowerPlants ...165 Cl'audiaAlmeida,AlbertoArazo,YvesCrouzetandKaramaKanoun AMethodofAnalysisofFaultTreeswithTimeDependencies ...176 JanMagottandPawe lSkrobanek Formal Methods AFormalMethodsCaseStudy:UsingLight-WeightVDM fortheDevelopmentofaSecuritySystemModule...187 GeorgDroschl,WalterKuhn,GeraldSonneckandMichaelThuswald FormalMethods:TheProblemIsEducation...198 ThierryScheurer FormalMethodsDi?usion:PastLessonsandFutureProspects...211 R. Bloom?eld,D. Craigen,F. Koob,M. UllmannandS. Wittmann InvitedPaper SafeTech:AControlOrientedViewpoint...227 MaartenSteinbuch SafetyGuidelines,StandardsandCerti?cation DerivationofSafetyTargetsfortheRandomFailure ofProgrammableVehicleBasedSystems...240 RichardEvansandJonathanMo?ett IEC61508-ASuitableBasisfortheCerti?cation ofSafety-CriticalTransport-InfrastructureSystems??...250 DerekFowlerandPhilBennett Table of Contents IX HardwareAspects AnApproachtoSoftwareAssistedRecovery fromHardwareTransientFaultsforRealTimeSystems...264 D. BasuandR. Paramasivam ProgrammableElectronicSystemDesign&Veri?cationUtilizingDFM...275 MichelHoutermans,GeorgeApostolakis,AarnoutBrombacher andDimitriosKarydas SIMATICS7-400F/FH:Safety-RelatedProgrammableLogicController...286 AndreasSchenk SafetyAssessmentI AssessmentoftheReliabilityofFault-TolerantSoftware: ABayesianApproach...294 BevLittlewood,PeterPopovandLorenzoStrigini EstimatingDependabilityofProgrammableSystemsUsingBBNs...309 BjornAxelGran,GustavDahll,SiegfriedEisinger,EivindJ. Lund, JanGerhardNorstrom,PeterStrockaandBrittJ. Ystanes DesignforSafety ImprovementsinProcessControlDependability throughInternetSecurityTechnology...321 FerdinandJ. Dafelmair ASurveyonSafety-CriticalMulticastNetworking ...333 JamesS. PascoeandR. J. Loader InvitedPaper CausalReasoningaboutAircraftAccidents...344 PeterB. Ladkin Transport&Infrastructure ControllingRequirementsEvolution:AnAvionicsCaseStudy...361 StuartAndersonandMassimoFelici HAZOPAnalysisofFormalModels ofSafety-CriticalInteractiveSystems...

COTS-Based Software Systems - First International Conference, ICCBSS 2002, Orlando, FL, USA, February 4-6, 2002, Proceedings... COTS-Based Software Systems - First International Conference, ICCBSS 2002, Orlando, FL, USA, February 4-6, 2002, Proceedings (Paperback, 2002 ed.)
John Dean, Andree Gravel
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on COTS-Based Software Systems, ICCBSS 2002, held in Orlando, Florida, USA, in February 2002.The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The book addresses all current issues on commercial-off-the-shelf software systems, from the R&D as well as from the practitioner's point of view.

Cooperative Information Systems - 7th International Conference, CoopIS 2000 Eilat, Israel, September 6-8, 2000 Proceedings... Cooperative Information Systems - 7th International Conference, CoopIS 2000 Eilat, Israel, September 6-8, 2000 Proceedings (Paperback, 2000 ed.)
Opher Etzion, Peter Scheuermann
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

Cooperation among systems has gained substantial importance in recent years: electronic commerce virtual enterprises and the middleware paradigm are just some examples in this area. CoopIS is a multi-disciplinary conference, which deals with all aspects of cooperation. The relevant disciplines are: collaborative work, distributed databases, distributed computing, electronic commerce, human-computer interaction, multi-agent systems, information retrieval, and workflow systems. The CoopIS series provides a forum for well-known researchers who are drawn by the stature and the tradition of these conference series and has a leading role in shaping the future of the cooperative information systems area. CoopIS 2000 is the seventh conference in the series and the fifth conference organized by the International Foundation on Cooperative Information Systems (IFCIS). It is sponsored by the IFCIS, the IBM Research Laboratory in Haifa and Compaq, Tandem labs Israel. It replaces the former international workshops on Interoperability in Multidatabase systems (IMS) and the conference series on Cooperative Information Systems (CoopIS & ICICIS). In response to the call for papers 74 papers were submitted. Each of them was reviewed by at least three reviewers, and at the end of this process 24 papers were accepted for presentation at the conference. Six additional papers were selected for short presentations. In addition the conference includes two panels, two keynote speakers (Professor Calton Pu from Georgia Tech and Professor Sheizaf Rafaeli from Haifa University) and one tutorial. A special issue of the International Journal of Cooperative Information Systems will follow. August 2000 Opher Etzion & Peter Scheuermann

Policies for Distributed Systems and Networks - International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001... Policies for Distributed Systems and Networks - International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001 Proceedings (Paperback)
Morris Sloman, Jorge Lobo, Emil C. Lupu
R1,485 Discovery Miles 14 850 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Workshop on Policies for Distributed Systems and Networks, POLICY 2001, held in Bristol, UK in January 2001. The 16 revised full papers presented were carefully reviewed and selected from 43 submissions. Among the topics covered are abstractions and notations for policy specifications, security policies, access control, implementations, applications, quality of service, and management.

Recent Advances in Intrusion Detection - 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings... Recent Advances in Intrusion Detection - 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001 Proceedings (Paperback, 2001 ed.)
Wenke Lee, Ludovic Me, Andreas Wespi
R1,452 Discovery Miles 14 520 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Fourth International Workshop on Recent Advances in Intrusion Detection, RAID 2001, held in Davis, CA, USA, in October 2001.The 12 revised full papers presented were carefully reviewed and selected from a total of 55 submissions. The papers are organized in sections on logging, cooperation, anomaly detection, intrusion tolerance, legal aspects and specification-based IDS.

High-Performance Computing and Networking - 8th International Conference, HPCN Europe 2000 Amsterdam, The Netherlands, May... High-Performance Computing and Networking - 8th International Conference, HPCN Europe 2000 Amsterdam, The Netherlands, May 8-10, 2000 Proceedings (Paperback, 2000 ed.)
Marian Bubak, Roy Williams, Hamideh Afsarmanesh, Bob Hertzberger
R2,771 Discovery Miles 27 710 Ships in 18 - 22 working days

This volume contains the proceedings of the international HPCN Europe 2000 event which was held in the Science and Technology Centre Watergraafsmeer, Amsterdam, the Netherlands, May 8-10, 2000. HPCN (High Performance Computing and Networking)Europeeventwas organized for the r st time in 1993 in Amsterdam as the result of several i- tiatives in Europe, the United States of America, and Japan. Succeeding HPCN events were held in Munich (1994), Milan (1995), Brussels (1996), and Vienna (1997), returning to Amsterdam in 1998 to stay. The HPCN event keeps growing and advancing every year, and this year the event consisted of the scientic conference, focused workshops, and several associated events. Theplenary lectures werepresented bysix renowned speakers: { Henk van der Vorst, University of Utrecht, The Netherlands: Giant Eig- problems within Reach, { WolfgangGentzsch, CTO, GridwareInc., Germany: The Information Power Grid is Changing our World, { Bernard Lecussan, SupAero and ONERA/CERT/DTIM, France: Irregular Application Computations on a Cluster of Workstations, { Miguel Albrecht, European Southern Observatory, Garching, Germany: Technologies for Mining Terabytes of Data, { HansMeinhardt, Max-Planck-Institut,Germany: The Algorithmic Beauty of Sea Shells,and { IngoAugustin,CERN,Geneva,Switzerland: Towards Multi-petabyte Storage Facilities. Theconference consisted ofparalleltrackspresenting 52selected papers, andone track presenting 25 posters. The areas covered in the conference include: Ind- trial and General End-User Applications of HPCN, Computational and C- puter Sciences, and this year the scope of the conference was further expanded by an additional area to emphasize the information management aspects, and the importance of the web-based cooperative application infrastructures.

Advances in Learning Software Organizations - Third International Workshop, LSO 2001, Kaiserslautern, Germany, September 12-13,... Advances in Learning Software Organizations - Third International Workshop, LSO 2001, Kaiserslautern, Germany, September 12-13, 2001. Proceedings (Paperback, 2001 ed.)
Klaus-Dieter Althoff, Raimund L. Feldmann, Wolfgang Muller
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Learning Software Organizations, LSO 2001, held in Kaiserslautern, Germany, in September 2001.The twelve revised full papers presented together with an introductory overview, keynote and panel summaries, and three posters were carefully reviewed and selected for inclusion in the book. Among the topics addressed are organizational learning in dynamic domains, knowledge management in software development, Web-based collaborative learning, knowledge management support, software process improvement, Web-based data mining, process-integrated learning, process-centered software engineering education, etc.

Lectures on Formal Methods and Performance Analysis - First EEF/Euro Summer School on Trends in Computer Science Berg en Dal,... Lectures on Formal Methods and Performance Analysis - First EEF/Euro Summer School on Trends in Computer Science Berg en Dal, The Netherlands, July 3-7, 2000. Revised Lectures (Paperback, 2001 ed.)
Ed Brinksma, Holger Hermanns, Joost-Pieter Katoen
R1,575 Discovery Miles 15 750 Ships in 18 - 22 working days

Traditionally, models and methods for the analysis of the functional correctness of reactive systems, and those for the analysis of their performance (and - pendability) aspects, have been studied by di?erent research communities. This has resulted in the development of successful, but distinct and largely unrelated modeling and analysis techniques for both domains. In many modern systems, however, the di?erence between their functional features and their performance properties has become blurred, as relevant functionalities become inextricably linked to performance aspects, e.g. isochronous data transfer for live video tra- mission. During the last decade, this trend has motivated an increased interest in c- bining insights and results from the ?eld of formal methods - traditionally - cused on functionality - with techniques for performance modeling and analysis. Prominent examples of this cross-fertilization are extensions of process algebra and Petri nets that allow for the automatic generation of performance models, the use of formal proof techniques to assess the correctness of randomized - gorithms, and extensions of model checking techniques to analyze performance requirements automatically. We believe that these developments markthe - ginning of a new paradigm for the modeling and analysis of systems in which qualitative and quantitative aspects are studied from an integrated perspective. We are convinced that the further worktowards the realization of this goal will be a growing source of inspiration and progress for both communities.

New Approaches in Software Measurement - 10th International Workshop, IWSM 2000, Berlin, Germany, October 4-6, 2000.... New Approaches in Software Measurement - 10th International Workshop, IWSM 2000, Berlin, Germany, October 4-6, 2000. Proceedings (Paperback, 2001 ed.)
Reiner Dumke, Alain Abran
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Software Measurement, IWSM 2000, held in Berlin, Germany in October 2000.The 10 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on object-oriented software measurement, software process improvement, function-point-based software measurement, software measurement of special aspects, improving the software measurement process.

System Development - A Strategic Framework (Paperback, Softcover reprint of the original 1st ed. 2000): Michael Bronzite System Development - A Strategic Framework (Paperback, Softcover reprint of the original 1st ed. 2000)
Michael Bronzite
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

System Development: A Strategic Framework looks at one of the key issues in the design and development of IT systems: the fact that the bulk of system development projects undertaken will fail to meet originally defined objectives. Using a number of case studies, it analyses the reasons for this poor performance and provides the reader with a pattern of well-defined failure mechanisms which are especially relevant to large, long-term projects. With these established, the book then generates a set of planning procedures and corporate guidelines which will substantially reduce the impact and probability of financial and performance disasters in future projects.Accessible to the professional and non-technical reader, this book will prove invaluable to project managers, development managers, IT controllers, project engineers, and systems analysts as well as MSc and MBA students studying computer system development.

Lessons in System Safety - Proceedings of the Eighth Safety-critical Systems Symposium, Southampton, UK 2000 (Paperback, 1999... Lessons in System Safety - Proceedings of the Eighth Safety-critical Systems Symposium, Southampton, UK 2000 (Paperback, 1999 ed.)
Felix Redmill, Tom Anderson
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

Lessons in System Safety contains the full set of invited papers presented at the Eighth Annual Safety-critical Systems Symposium, held in Southampton, February 2000. The safety-critical systems domain is rapidly expanding, and its industrial problems are always candidates for academic research. It embraces almost all industry sectors, and lessons learned in one are commonly appropriate to others. The Safety-critical Systems Symposium provides an annual forum for discussing such problems, and the papers in this volume, being from both industrial and academic institutions, all offer lessons in system safety.

Performance Evaluation: Origins and Directions (Paperback, 2000 ed.): Gunter Haring, Christoph Lindemann, Martin Reiser Performance Evaluation: Origins and Directions (Paperback, 2000 ed.)
Gunter Haring, Christoph Lindemann, Martin Reiser
R2,875 Discovery Miles 28 750 Ships in 18 - 22 working days

This monograph-like state-of-the-art survey presents the history, the key ideas, the success stories, and future challenges of performance evaluation and demonstrates the impact of performance evaluation on a variety of different areas through case studies in a coherent and comprehensive way. Leading researchers in the field have contributed 19 cross-reviewed topical chapters competently covering the whole range of performance evaluation, from theoretical and methodological issues to applications in numerous other fields. Additionally, the book contains one contribution on the role of performance evaluation in industry and personal accounts of four pioneering researchers describing the genesis of breakthrough results.The book will become a valuable source of reference and indispensable reading for anybody active or interested in performance evaluation.

Transactions and Database Dynamics - 8th International Workshop on Foundations of Models and Languages for Data and Objects,... Transactions and Database Dynamics - 8th International Workshop on Foundations of Models and Languages for Data and Objects, Dagstuhl Castle, Germany, September 27-30, 1999 Selected Papers (Paperback, 2000 ed.)
Gunter Saake, Kerstin Schwarz, Can Turker
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

These post-proceedings contain the revised versions of the accepted papers of the international workshop \Transactions and Database Dynamics," which was the eighth workshop in a series focusing on foundations of models and languages for data and objects (FoMLaDO). Seven long papers and three short papers were accepted for inclusion in the proceedings. The papers address various issues of transactions and database dynamics: { criteria and protocols for global snapshot isolation in federated transaction management, { uni ed theory of concurrency control and replication control, { speci cation of evolving information systems, { inheritance mechanisms for deductive object databases with updates, { speci cation of active rules for maintaining database consistency, { integrity checking in subtransactions, { open nested transactions for multi-tier architectures, { declarative speci cation of transactions with static and dynamic integrity constraints, { logic-based speci cation of update queries as open nested transactions, and { execution guarantees and transactional processes in electronic commerce payments. In addition to the regular papers, there are papers resulting from two working groups. The rst working group paper discusses the basis for transactional c- putation. In particular, it addresses the speci cation of transactional software. The second working group paper focuses on transactions in electronic commerce applications. Among others, Internet transactions, payment protocols, and c- currency control and persistence mechanisms are discussed. Moreover, there is an invited paper by Jari Veijalainen which discusses tr- sactional aspects in mobile electronic commerce.

Software Process Technology - 7th European Workshop, EWSPT 2000, Kaprun, Austria, February 21-25, 2000. Proceedings (Paperback,... Software Process Technology - 7th European Workshop, EWSPT 2000, Kaprun, Austria, February 21-25, 2000. Proceedings (Paperback, 2000 ed.)
Reidar Conradi
R1,478 Discovery Miles 14 780 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th European Workshop on Software Process Technology, EWSPT 2000, held in Kaprun, Austria in February 2000 in conjunction with a meeting of the European ESPRIT IV Project for Process Instance Evolution (PIE).The 21 revised papers presented were carefully reviewed and selected from 44 submissions. The book is organized in sections on methods, applications, process instance evolution, distributed processes and process modeling languages, and industrial experience.

Active Technologies for Network and Service Management - 10th IFIP/IEEE International Workshop on Distributed Systems:... Active Technologies for Network and Service Management - 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM'99, Zurich, Switzerland, October 11-13, 1999, Proceedings (Paperback, 1999 ed.)
Rolf Stadler, Burkhard Stiller
R1,508 Discovery Miles 15 080 Ships in 18 - 22 working days

This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM'99), which took place at the ETH Zurich in Switzerland and was hosted by the Computer Engineering and Networking Laboratory, TIK. DSOM'99 is the tenth workshop in a series of annual workshops, and Zurich is proud to host this 10th anniversary of the IEEE/IFIP workshop. DSOM'99 follows highly successful meetings, the most recent of which took place in Delaware, U.S.A. (DSOM'98), Sydney, Australia (DSOM'97), and L'Aquila, Italy (DSOM'96). DSOM workshops attempt to bring together researchers from the area of network and service management in both industry and academia to discuss recent advancements and to foster further growth in this ?eld. In contrast to the larger management symposia IM (In- grated Network Management) and NOMS (Network Operations and Management S- posium), DSOM workshops follow a single-track program, in order to stimulate interaction and active participation. The speci?c focus of DSOM'99 is "Active Technologies for Network and Service Management," re?ecting the current developments in the ?eld of active and program- ble networks, and about half of the papers in this workshop fall within this category.

Vulnerability Management (Hardcover, 2nd edition): Park Foreman Vulnerability Management (Hardcover, 2nd edition)
Park Foreman
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Platinum Instamaths: Grade 6 CAPS
H. Barry, W. Colyn, … Paperback  (3)
R116 Discovery Miles 1 160
Speurhond Willem in Japan
Elizabeth Wasserman Paperback R190 R170 Discovery Miles 1 700
Kwezi: Collectors Edition 5 - Issues 13…
Loyiso Mkize Paperback R258 Discovery Miles 2 580
Die gewildste alien in die ruimte
Cecilia Steyn Paperback R195 R145 Discovery Miles 1 450
La Bruja Escondida (the Hidden Witch…
Molly Knox Ostertag Paperback R397 Discovery Miles 3 970
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R431 R271 Discovery Miles 2 710
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
The Networknomicon, or SNMP Mastery
Michael W Lucas, Abdul Alhazred Hardcover R1,436 R1,247 Discovery Miles 12 470
Microsoft Forefront Security…
Jesse Varsalone Paperback R1,129 R878 Discovery Miles 8 780
Pearson Edexcel GCSE (9-1) Mathematics…
Katherine Pate, Naomi Norman Paperback  (1)
R640 Discovery Miles 6 400

 

Partners