Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
In today s world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time. Event-based architectures inherently decouple system components. Event-based components are not designed to work with specific other components in a traditional request/reply mode, but separate communication from computation through asynchronous communication mechanisms via a dedicated notification service. Muhl, Fiege, and Pietzuch provide the reader with an in-depth description of event-based systems. They cover the complete spectrum of topics, ranging from a treatment of local event matching and distributed event forwarding algorithms, through a more practical discussion of software engineering issues raised by the event-based style, to a presentation of state-of-the-art research topics in event-based systems, such as composite event detection and security. Their presentation gives researchers a comprehensive overview of the area and lots of hints for future research. In addition, they show the power of event-based architectures in modern system design, thus encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.
This book provides an in-depth description of event-based systems, covering topics ranging from local event matching and distributed event forwarding algorithms, through a practical discussion of software engineering issues raised by the event-based style, to state-of-the-art research in event-based systems like composite event detection and security. The authors offer a comprehensive overview, and show the power of event-based architectures in modern system design, encouraging professionals to exploit this technique in next generation large-scale distributed applications like information dissemination, network monitoring, enterprise application integration, or mobile systems.
This book constitutes the refereed proceedings of the Second International Workshop on Electronic Commerce, WELCOM 2001, held in Heidelberg, Germany in November 2001.The 17 revised full papers presented together with two invited contributions were carefully reviewed and selected from 34 submissions. The papers are organized in topical sections on trade and markets, security and trust, auctions, profiling, and business interaction.
Den Kern des Buches bildet die Beantwortung der Frage, auf welche Weise Autonomie hervorgerufen wird und woran ihr Auftreten erkannt werden kann. Aufbauend auf dieser Untersuchung werden die Eigenschaften bekannter Architekturmuster und Architekturen dahingehend untersucht, inwiefern sie autonomes Verhalten fordern. Mit klarem Praxisbezug werden anschliessend die Schwachstellen analysiert, die typischerweise in autonomen Systemen auftreten bzw. die durch unerwunschtes autonomes Verhalten entstehen konnen, sowie Massnahmen zur Erkennung und Beseitigung solcher Schwachstellen diskutiert. Dieses Buch basiert auf den Ergebnissen der Studie "Modellierung von Autonomie in IT-Architekturen," die die Autoren im Auftrag des Bundesamts fur Sicherheit in der Informationstechnik (BSI) erstellt haben."
|
You may like...
Indiana Jones And The Dial Of Destiny
Harrison Ford, Phoebe Waller-Bridge, …
Blu-ray disc
R187
Discovery Miles 1 870
|