Dreams have a way of becoming influenced by the obsessions of the waking world. This holds true for Seth Reardon as well, the top professional dreamer in the new and dominant dream industry. Seth finds his entire way of life in jeopardy because of emotions too powerful to ignore, yet too dark to satisfy.
The only comfort he sees is in the eyes of a woman he barely knows, but who seems to know everything about him. Sara not only helps Seth deal with the doubts about his life, but also gives him hope for a peaceful future. If he could only escape the people trying to kill him, they could be...
Dreams have a way of becoming influenced by the obsessions of the waking world. This holds true for Seth Reardon as well, the top professional dreamer...
Dreams have a way of becoming influenced by the obsessions of the waking world. This holds true for Seth Reardon as well, the top professional dreamer in the new and dominant dream industry. Seth finds his entire way of life in jeopardy because of emotions too powerful to ignore, yet too dark to satisfy.
The only comfort he sees is in the eyes of a woman he barely knows, but who seems to know everything about him. Sara not only helps Seth deal with the doubts about his life, but also gives him hope for a peaceful future. If he could only escape the people trying to kill him, they could be...
Dreams have a way of becoming influenced by the obsessions of the waking world. This holds true for Seth Reardon as well, the top professional dreamer...
The design of computer systems to be embedded in critical real-time applications is a complex task. Such systems must not only guarantee to meet hard real-time deadlines imposed by their physical environment, they must guarantee to do so dependably, despite both physical faults (in hardware) and design faults (in hardware or software). A fault-tolerance approach is mandatory for these guarantees to be commensurate with the safety and reliability requirements of many life- and mission-critical applications. This book explains the motivations and the results of a collaborative project', whose...
The design of computer systems to be embedded in critical real-time applications is a complex task. Such systems must not only guarantee to meet hard ...
Third in a new series of campaign studies that take a different approach toward military history, The Maps of Chickamauga explores this largely misunderstood battle through the use of 120 full-color maps, graphically illustrating the complex tangle of combat s ebb and flow that makes the titanic bloodshed of Chickamauga one of the most confusing actions of the American Civil War. Track individual regiments through their engagements at fifteen to twenty-minute intervals or explore each army in motion as brigades and divisions maneuver and deploy to face the enemy. The Maps of Chickamauga...
Third in a new series of campaign studies that take a different approach toward military history, The Maps of Chickamauga explores this largely misund...
WINNER, 2010, RICHARD HARWELL AWARD, GIVEN BY THE CIVIL WAR ROUND TABLE OF ATLANTAConfederate cavalry has a storied and favorable relationship with the history of the Civil War. Tales of raids and daring exploits create a whiff of lingering romance about the horse soldiers of the Lost Cause. Sometimes, however, romance obscures history.In August 1863 William Rosecrans Union Army of the Cumberland embarked on a campaign of maneuver to turn Braxton Bragg s Army of Tennessee out of Chattanooga, one of the most important industrial and logistical centers of the Confederacy. Despite the presence...
WINNER, 2010, RICHARD HARWELL AWARD, GIVEN BY THE CIVIL WAR ROUND TABLE OF ATLANTAConfederate cavalry has a storied and favorable relationship with th...
The design of computer systems to be embedded in critical real-time applications is a complex task. Such systems must not only guarantee to meet hard real-time deadlines imposed by their physical environment, they must guarantee to do so dependably, despite both physical faults (in hardware) and design faults (in hardware or software). A fault-tolerance approach is mandatory for these guarantees to be commensurate with the safety and reliability requirements of many life- and mission-critical applications. This book explains the motivations and the results of a collaborative project', whose...
The design of computer systems to be embedded in critical real-time applications is a complex task. Such systems must not only guarantee to meet hard ...
Delta-4 is a 5-nation, 13-partner project that has been investigating the achievement of dependability in open distributed systems, including real-time systems. This book describes the design and validation of the distributed fault-tolerant architecture developed within this project. The key features of the Delta-4 architecture are: (a) a distributed object-oriented application support environment; (b) built-in support for user-transparent fault tolerance; (c) use of multicast or group communication protocols; and (d) use of standard off the-shelf processors and standard local area network...
Delta-4 is a 5-nation, 13-partner project that has been investigating the achievement of dependability in open distributed systems, including real-tim...