0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings... Automata, Languages and Programming - 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings (Paperback, 2007 ed.)
Lars Arge, Christian Cachin, Tomasz Jurdzinski
R3,219 Discovery Miles 32 190 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 34th International Colloquium on Automata, Languages and Programming, ICALP 2007, held in Wroclaw, Poland in July 2007.

The 76 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from 242 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations.

Advances in Cryptology - EUROCRYPT 2004 - International Conference on the Theory and Applications of Cryptographic Techniques,... Advances in Cryptology - EUROCRYPT 2004 - International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings (Paperback, 2004 ed.)
Christian Cachin, Jan Camenisch
R3,323 Discovery Miles 33 230 Ships in 10 - 15 working days

These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented "Paradigms for Multiparty Computation. " The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d- cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases.

Introduction to Reliable and Secure Distributed Programming (Paperback, 2nd ed. 2011): Christian Cachin, Rachid Guerraoui, Luis... Introduction to Reliable and Secure Distributed Programming (Paperback, 2nd ed. 2011)
Christian Cachin, Rachid Guerraoui, Luis Rodrigues
R1,660 R1,559 Discovery Miles 15 590 Save R101 (6%) Ships in 9 - 15 working days

In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".

Introduction to Reliable and Secure Distributed Programming (Hardcover, 2nd ed. 2011): Christian Cachin, Rachid Guerraoui, Luis... Introduction to Reliable and Secure Distributed Programming (Hardcover, 2nd ed. 2011)
Christian Cachin, Rachid Guerraoui, Luis Rodrigues
R2,259 R2,099 Discovery Miles 20 990 Save R160 (7%) Ships in 9 - 15 working days

In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes. Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance".

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Glu Dots - Extra Strength (64…
R55 Discovery Miles 550
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
JBL T110 In-Ear Headphones (Black)
 (13)
R229 R201 Discovery Miles 2 010
Home Quip Stainless Steel Double Wall…
R181 R155 Discovery Miles 1 550
Snappy Tritan Bottle (1.5L)(Green)
R229 R180 Discovery Miles 1 800
Coty Vanilla Musk Cologne Spray (50ml…
R852 R508 Discovery Miles 5 080
Great Johannesburg - What Happened? How…
Nickolaus Bauer Paperback R330 R240 Discovery Miles 2 400
Sylvanian Families Country Tree School
 (7)
R2,759 Discovery Miles 27 590
Brother LX27NT Portable Free Arm Sewing…
 (1)
R3,999 R2,999 Discovery Miles 29 990
Elecstor 18W In-Line UPS (Black)
R999 R869 Discovery Miles 8 690

 

Partners