Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007, held in Paris, France, November 14-16, 2007. The 27 regular papers presented together with the extended
abstracts of 3 invited lectures were carefully reviewed and
selected from 64 submissions. The papers address all aspects of
self-stabilization, safety and security, recovery oriented systems
and programing, from theoretical contributions, to reports of the
actual experience of applying the principles of self-stabilization
to static and dynamic systems.
This book constitutes the refereed proceedings of the Second International Workshop on Biologically Inspired Approaches to Advanced Information Technology, BioADIT 2006, held in Osaka, Japan, in January 2006. The 30 full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected for inclusion in the book. The contributions range from basic research in biology and in information technology, to more application-oriented developments in software and in hardware. The papers are organized in topical sections on robotics, networking, biological systems, self-organization, evolutionary computation, and modeling and imaging.
This book constitutes the thoroughly refereed proceedings of the 15 International Symposium on Stabilization, Safety and Security of Distributed Systems, SSS 2013, held in Osaka, Japan, in November 2013. The 23 regular papers and 12 short papers presented were carefully reviewed and selected from 68 submissions. The Symposium is organized in several tracks, reflecting topics to self-* properties. The tracks are self-stabilization, fault tolerance and dependability; formal methods and distributed systems; ad-hoc, sensors, mobile agents and robot networks and P2P, social, self-organizing, autonomic and opportunistic networks.
|
You may like...
|