Formal Techniques for Networked and Distributed Systems - Forte 2003: 23rd Ifip Wg 6.1 International Conference, Berlin, Germany, September 29 -- Octo
ISBN: 9783540201755 / Angielski / Miękka / 429 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of FORTE 2003, the 23rd IFIP TC 6/ WG 6.1 International Conference on Formal Techniques for Networked and D- tributed Systems, held in Berlin, Germany, September 29-October 2, 2003. FORTE denotes a series of international working conferences on formal descr- tion techniques (FDTs) applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a s- ond series under the name FORTE was set up. Both series were united to FORTE/PSTV in 1996. Two years ago the conference name was changed to its current...
This volume contains the proceedings of FORTE 2003, the 23rd IFIP TC 6/ WG 6.1 International Conference on Formal Techniques for Networked and D- trib...
|
|
cena:
195,87 zł |
Secure Data Management: Vldb 2004 Workshop, Sdm 2004, Toronto, Canada, August 30, 2004, Proceedings
ISBN: 9783540229834 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people s privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also...
Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on dat...
|
|
cena:
195,87 zł |
Information Security: 7th International Conference, Isc 2004, Palo Alto, Ca, Usa, September 27-29, 2004, Proceedings
ISBN: 9783540232087 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would...
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature o...
|
|
cena:
195,87 zł |
Programming Languages and Systems: Second Asian Symposium, APLAS 2004, Taipei, Taiwan, November 4-6, 2004. Proceedings
ISBN: 9783540237242 / Angielski / Miękka / 454 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the organizing committee I would like to welcome you all to the second Asian Symposium on Programming Languages and Systems (APLAS 2004) held in Taipei on November 4 6, 2004. Since the year 2000, researchers in the area of programming languages and systems have been meeting annually in Asia to present their most recent research results, thus contributing to the advancementofthisresearcharea.ThelastfourmeetingswereheldinSingapore (2000), Daejeon (2001), Shanghai (2002), and Beijing (2003). These meetings were very fruitful and provided an excellent venue for the exchange of...
On behalf of the organizing committee I would like to welcome you all to the second Asian Symposium on Programming Languages and Systems (APLAS 2004) ...
|
|
cena:
195,87 zł |
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
ISBN: 9783540255215 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, Germany in April 2005.The 14 revised full papers and 3 revised short papers presented together with abstracts of 5 invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on smart devices and applications, authentication, privacy and anonymity, and access control and information flow.
This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, G...
|
|
cena:
195,87 zł |
Human Interactive Proofs: Second International Workshop, Hip 2005, Bethlehem, Pa, Usa, May 19-20, 2005, Proceedings
ISBN: 9783540260011 / Angielski / Miękka / 596 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the Second International Workshop on Human Interactive Proofs, HIP 2005, held in Bethlehem, PA, USA in May 2005. This book is devoted to the new class of security protocols called human interactive proofs. It includes sections such as: CAPTCHAs and performance analysis, and HIP architectures.
Constitutes the refereed proceedings of the Second International Workshop on Human Interactive Proofs, HIP 2005, held in Bethlehem, PA, USA in May 200...
|
|
cena:
195,87 zł |
Pervasive Computing: Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings
ISBN: 9783540260080 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Pervasive Computing, PERVASIVE 2005, held in Munich, Germany in May 2005. The 20 revised full papers presented were carefully reviewed and selected from 130 submissions. The papers are organized in topical sections on location techniques, activity and context, location and privacy, handheld devices, sensor systems, and user interaction.
This book constitutes the refereed proceedings of the Third International Conference on Pervasive Computing, PERVASIVE 2005, held in Munich, German... |
|
cena:
195,87 zł |
Architecting Systems with Trustworthy Components: International Seminar, Dagstuhl Castle, Germany, December 12-17, 2004. Revised Selected Papers
ISBN: 9783540358008 / Angielski / Miękka / 299 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the International Dagstuhl-Seminar on Architecting Systems with Trustworthy Components, held in Dagstuhl Castle, Germany, in December 2004. Presents 10 revised full papers together with 5 invited papers contributed by outstanding researchers. Discusses core problems in measurement and normalization of non-functional properties, modular reasoning over non-functional properties, capture of component requirements in interfaces and protocols, interference and synergy of top-down and bottom-up aspects, and more. This book constitutes the thoroughly refereed post-proceedings of the International Dagstuhl-Seminar on Architecting Systems with Trustworthy Compo... |
|
cena:
195,87 zł |
Metalevel Architectures and Separation of Crosscutting Concerns: Third International Conference, REFLECTION 2001, Kyoto, Japan, September 25-28, 2001 Proceedings
ISBN: 9783540426189 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the proceedings of REFLECTION 2001, the Third Int- national Conference on Metalevel Architectures and Separation of Crosscutting Concerns, which was held in Kyoto, September 25-28, 2001. Metalevel architectures and re?ection have drawn the attention of researchers and practitioners throughout computer science. Re?ective and metalevel te- niques are being used to address real-world problems in such areas as: progr- ming languages, operating systems, databases, distributed computing, expert systems and web computing. Separation of concerns has been a guiding principle of...
This volume constitutes the proceedings of REFLECTION 2001, the Third Int- national Conference on Metalevel Architectures and Separation of Crosscutti...
|
|
cena:
195,87 zł |
Security and Privacy in Digital Rights Management: ACM Ccs-8 Workshop Drm 2001, Philadelphia, Pa, Usa, November 5, 2001. Revised Papers
ISBN: 9783540436775 / Angielski / Miękka / 250 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Forming the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held during the ACM CCS-8 Conference in Philadelphia, PA, USA, in November 2001, these 14 revised, full papers were carefully reviewed and selected from 50 submissions. The papers are organized in topical sections on renewability, fuzzy hashing, cryptographic techniques and fingerprinting, privacy and architectures, software tamper resistance, cryptanalysis, and economic and legal aspects.
Forming the thoroughly refereed post-proceedings of the International Workshop on Security and Privacy in Digital Rights Management, DRM 2001, held du...
|
|
cena:
195,87 zł |
Linear Time, Branching Time and Partial Order in Logics and Models for Concurrency: School/Workshop, Noordwijkerhout, the Netherlands, May 30 - June 3
ISBN: 9783540510802 / Angielski / Miękka / 718 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume is based on the "School/Workshop on Linear Time, Branching Time and Partial Order in Logics and Models for Concurrency" organized by the editors and held in the period May 30-June 3, 1988 at Noordwijkerhout, The Netherlands. The School/Workshop was an activity of the project REX - Research and Education in Concurrent Systems. The volume contains tutorials and research contributions to the three approaches - linear time, - branching time, and - partial order in semantics and proof theory of concurrent programs by the main specialists in this field. It promotes an in-depth...
This volume is based on the "School/Workshop on Linear Time, Branching Time and Partial Order in Logics and Models for Concurrency" organized by the e...
|
|
cena:
391,77 zł |
Bounded Incremental Computation
ISBN: 9783540613206 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Incremental computation concerns the re-computation of output after a change in the input, whereas algorithms and programs usually derive their output directly from their input. This book investigates the concept of incremental computation and dynamic algorithms in general and provides a variety of new results, especially for computational problems from graph theory: the author presents e.g. efficient incremental algorithms for several shortest-path problems as well as incremental algorithms for the circuit value annotation problem and for various computations in reducible flow graphs.
Incremental computation concerns the re-computation of output after a change in the input, whereas algorithms and programs usually derive their output...
|
|
cena:
195,87 zł |
Applied Cryptography and Network Security: First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings
ISBN: 9783540202080 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 1st International Conference on Applied Cryptography and Network Se- rity (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte. Ltd. and the Kunming government. It was held in Kunming, China in - tober 2003. The conference proceedings was published as Volume 2846 of the Lecture Notes in Computer Science (LNCS) series of Springer-Verlag. The conference received 191 submissions, from 24 countries and regions; 32 of these papers were accepted, representing 15 countries and regions (acceptance rate...
The 1st International Conference on Applied Cryptography and Network Se- rity (ACNS 2003) was sponsored and organized by ICISA (International C- munic...
|
|
cena:
195,87 zł |
Computer Security - ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings
ISBN: 9783540203001 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea, bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year,...
ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer -...
|
|
cena:
195,87 zł |
Organic and Pervasive Computing -- ARCS 2004: International Conference on Architecture of Computing Systems, Augsburg, Germany, March 23-26, 2004, Proceedings
ISBN: 9783540212386 / Angielski / Miękka / 329 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Where is system architecture heading? The special interest group on Computer and Systems Architecture (Fachausschuss Rechner- und Systemarchitektur) of the German computer and information technology associations GI and ITG a- ed this question and discussed it during two Future Workshops in 2002. The result in a nutshell: Everything will change but everything else will remain. Future systems technologies will build on a mature basis of silicon and IC technology, onwell-understoodprogramminglanguagesandsoftwareengineering techniques, and on well-established operating systems and middleware...
Where is system architecture heading? The special interest group on Computer and Systems Architecture (Fachausschuss Rechner- und Systemarchitektur) o...
|
|
cena:
195,87 zł |
Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers
ISBN: 9783540213765 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and... This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 20... |
|
cena:
195,87 zł |
Financial Cryptography: 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers
ISBN: 9783540224204 / Angielski / Miękka / 286 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 8th International Conference on Financial Cryptography, FC 2004, held in Key West, FL, USA, in February 2004. talks and 4 panel statements were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on loyalty and micropayment systems, user authentication, e-voting, auctions and lotteries, game theoretic and cryptographic tools, and mix networks and anonymous communications.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Conference on Financial Cryptography, FC 2004, held in Key Wes...
|
|
cena:
195,87 zł |
Advances in Computer Systems Architecture: 9th Asia-Pacific Conference, Acsac 2004, Beijing, China, September 7-9, 2004, Proceedings
ISBN: 9783540230038 / Angielski / Miękka / 602 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the program committee, we were pleased to present this year s program for ACSAC: Asia-Paci?c Computer Systems Architecture Conference. Now in its ninth year, ACSAC continues to provide an excellent forum for researchers, educators and practitioners to come to the Asia-Paci?c region to exchange ideas on the latest developments in computer systems architecture. This year, the paper submission and review processes were semiautomated using the free version of CyberChair. We received 152 submissions, the largest number ever.Eachpaperwasassignedatleastthree, mostlyfour,...
On behalf of the program committee, we were pleased to present this year s program for ACSAC: Asia-Paci?c Computer Systems Architecture Conference. No...
|
|
cena:
391,77 zł |
Formal Techniques for Networked and Distributed Systems - Forte 2004: 24th Ifip Wg 6.1 International Conference, Madrid Spain, September 27-30, 2004,
ISBN: 9783540232520 / Angielski / Miękka / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the 24th IFIP TC 6/WG 6.1 Inter- tionalConference onFormalTechniquesfor Networkedand Distributed Systems (FORTE 2004), held in Madrid, Spain, September 27 30,2004.FORTE denotes a series of international working conferences on formal description techniques applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a second series under the name FORTE was set up. Both series were united to FORTE/PSTV in 1996. Three years ago the conference name was changed to its current form. The last ?ve...
This volume contains the proceedings of the 24th IFIP TC 6/WG 6.1 Inter- tionalConference onFormalTechniquesfor Networkedand Distributed Systems (FORT...
|
|
cena:
195,87 zł |
Middleware 2004: Acm/Ifip/Usenix International Middleware Conference, Toronto, Canada, October 18-20, 2004, Proceedings
ISBN: 9783540234289 / Angielski / Miękka / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Middleware systems compriseprogrammingmodels, abstractions, protocols, and services to facilitate the design, the development, the integration, and the - ployment of distributed applications in heterogeneous computing environments. Conceptually, the term middleware refers to a layer of software above the networking substrate and the operating system and below the (distributed) application. In practice these boundaries are not clear cut, with middleware functionality moving into and out of these layers. Remote communication, p- lish/subscribe, messaging, and (distributed) transaction...
Middleware systems compriseprogrammingmodels, abstractions, protocols, and services to facilitate the design, the development, the integration, and th...
|
|
cena:
391,77 zł |