Books > Computing & IT > General theory of computing
|
Buy Now
Autonomic and Trusted Computing - 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings (Paperback, 2008 ed.)
Loot Price: R2,903
Discovery Miles 29 030
|
|
Autonomic and Trusted Computing - 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings (Paperback, 2008 ed.)
Series: Programming and Software Engineering, 5060
Expected to ship within 10 - 15 working days
|
ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf-
ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and
Organic Computing Systems into Reality. The conference was held in
Oslo, Norway, d- ing June 23-25, 2008. ATC 2008 is a successor of
the First IFIP Workshop on Trusted and Au- nomic Ubiquitous and
Embedded Systems (TAUES 2005, Japan), the Inter- tional Workshop on
Trusted and Autonomic Computing Systems (TACS 2006, Austria), the
Third International Conference on Autonomic and Trusted C- puting
(ATC 2006, China), and the 4th International Conference on
Autonomic and Trusted Computing (ATC 2007, Hong Kong). Computing
systems including hardware, software, communication and n-
worksaregrowingdramaticallyinbothscale andheterogeneity, becoming
overly complex. Such complexity is getting even more critical with
the ubiquitous p- meation of embedded devices and other pervasive
systems. To cope with the growingandubiquitous complexity,
Autonomic Computing(AC)focuses onse- manageable computing and
communication systems that exhibit self-awareness,
self-con?guration, self-optimization, self-healing, self-protection
and other self-x operationsto the maximumextent possible without
humaninterventionorgu- ance. Organic Computing (OC) additionally
emphasizes natural-analogue c- cepts like self-organization and
controlled emergence. Any autonomic or organic system must be
trustworthy to avoid the risk of losingcontrolandto
retaincon?dencethatthe systemwillnotfail.Trustand/or distrust
relationships in the Internet and in pervasive infrastructures are
key
factorsinenablingdynamicinteractionandcooperationofvarioususers,
systems and services. Trusted/Trustworthy Computing (TC) aims at
making computing and communication systems as well as services
available, predictable, traceable, controllable, assessable,
sustainable, dependable, persistable, security/privacy protectable,
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|