![]() |
Formal Techniques for Networked and Distributed Systems - Forte 2004: 24th Ifip Wg 6.1 International Conference, Madrid Spain, September 27-30, 2004,
ISBN: 9783540232520 / Angielski / Miękka / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the 24th IFIP TC 6/WG 6.1 Inter- tionalConference onFormalTechniquesfor Networkedand Distributed Systems (FORTE 2004), held in Madrid, Spain, September 27 30,2004.FORTE denotes a series of international working conferences on formal description techniques applied to computer networks and distributed systems. The conference series started in 1981 under the name PSTV. In 1988 a second series under the name FORTE was set up. Both series were united to FORTE/PSTV in 1996. Three years ago the conference name was changed to its current form. The last ?ve...
This volume contains the proceedings of the 24th IFIP TC 6/WG 6.1 Inter- tionalConference onFormalTechniquesfor Networkedand Distributed Systems (FORT...
|
cena:
200,77 |
![]() |
Middleware 2004: Acm/Ifip/Usenix International Middleware Conference, Toronto, Canada, October 18-20, 2004, Proceedings
ISBN: 9783540234289 / Angielski / Miękka / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Middleware systems compriseprogrammingmodels, abstractions, protocols, and services to facilitate the design, the development, the integration, and the - ployment of distributed applications in heterogeneous computing environments. Conceptually, the term middleware refers to a layer of software above the networking substrate and the operating system and below the (distributed) application. In practice these boundaries are not clear cut, with middleware functionality moving into and out of these layers. Remote communication, p- lish/subscribe, messaging, and (distributed) transaction...
Middleware systems compriseprogrammingmodels, abstractions, protocols, and services to facilitate the design, the development, the integration, and th...
|
cena:
401,58 |
![]() |
Digital Watermarking: Third International Workshop, Iwdw 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers
ISBN: 9783540248392 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed post-proceedings of the Third International Workshop on Digital Watermarking, IWDW 2004, held in Seoul, Korea in October/November 2004. These papers are organized in topical sections on systems, theory, authentication and steganography, cryptography, and methods.
Constitutes the refereed post-proceedings of the Third International Workshop on Digital Watermarking, IWDW 2004, held in Seoul, Korea in October/Nove...
|
cena:
200,77 |
![]() |
Information Security and Privacy: 10th Australasian Conference, Acisp 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
ISBN: 9783540265474 / Angielski / Miękka / 594 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 2005 Australasian Conference on Information Security and Privacy was the tenth in the annual series that started in 1996.Over the yearsACISP has grown from a relativelysmallconferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2005 was held at Queensland University of Technology in Brisbane, d- ing July 4 6, 2005. This year there were 185 paper submissions and from these 45 papers were accepted. Accepted papers came from 13 countries, with the largest proportions coming from Australia (12), China (8) and...
The 2005 Australasian Conference on Information Security and Privacy was the tenth in the annual series that started in 1996.Over the yearsACISP has g...
|
cena:
200,77 |
![]() |
Information and Communications Security: 7th International Conference, Icics 2005, Beijing, China, December 10-13, 2005, Proceedings
ISBN: 9783540309345 / Angielski / Miękka / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 7th International Conference on Information and Communications Security, ICICS 2005, held in Beijing, China in December 2005. This book features papers that are organized in topical sections on fair exchange, digital signatures, cryptographic protocols, cryptanalysis, network security, and more.
Constitutes the refereed proceedings of the 7th International Conference on Information and Communications Security, ICICS 2005, held in Beijing, Chin...
|
cena:
200,77 |
![]() |
Emerging Trends in Information and Communication Security: International Conference, Etrics 2006, Freiburg, Germany, June 6-9, 2006. Proceedings
ISBN: 9783540346401 / Angielski / Miękka / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security. This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS... |
cena:
200,77 |
![]() |
Applied Cryptography and Network Security: 4th International Conference, Acns 2006, Singapore, June 6-9, 2006, Proceedings
ISBN: 9783540347033 / Angielski / Miękka / 490 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore, during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This volume (LNCS 3989) contains papers presented in the academic track. ACNS was set a high standard when it was initiated in 2003. There has been a steady improvement in the quality of its program in the past 4 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York,...
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore, during June6-9,2006.ACNS 2006 brought tog...
|
cena:
401,58 |
![]() |
Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings
ISBN: 9783540405153 / Angielski / Miękka / 540 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in... |
cena:
200,77 |
![]() |
Formal Techniques in Real-Time and Fault-Tolerant Systems: 6th International Symposium, Ftrtft 2000 Pune, India, September 20-22, 2000 Proceedings
ISBN: 9783540410553 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The six Schools and Symposia on Formal Techniques in Real Time and Fault Tolerant Systems (FTRTFT) have seen the eld develop from tentative explo- tions to a far higher degree of maturity, and from being under the scrutiny of a few interested software designers and academics to becoming a well-established area of inquiry. A number of new topics, such as hybrid systems, have been g- minated at these meetings and cross-links explored with related subjects such as scheduling theory. There has certainly been progress during these 12 years, but it is sobering to see how far and how fast practice...
The six Schools and Symposia on Formal Techniques in Real Time and Fault Tolerant Systems (FTRTFT) have seen the eld develop from tentative explo- tio...
|
cena:
200,77 |
![]() |
Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings
ISBN: 9783540426622 / Angielski / Miękka / 562 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Malaga, Spain, on October 1-3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier Lopez and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their...
The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange ...
|
cena:
200,77 |
![]() |
Dependable Computing: Second Latin-American Symposium, LADC 2005, Salvador, Brazil, October 25-28, 2005, Proceedings
ISBN: 9783540295723 / Angielski / Miękka / 267 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Latin-American Symposium on Dependable Computing, LADC, isthemain Latin-American event dedicated to the discussion of the many issues related to dependability in computer systems and networks. It is a forum for researchers and practitioners (from all over the world) to present and discuss their latest results and experiences in this ?eld. LADC2005, thesecondeditionofthisevent, followedonthesuccessofLADC 2003, which took place at the Polytechnic School of the University of S ao Paulo. It was organized by LaSiD, the Distributed Systems Laboratoryassociated with the Department of Computer...
The Latin-American Symposium on Dependable Computing, LADC, isthemain Latin-American event dedicated to the discussion of the many issues related to d...
|
cena:
200,77 |
![]() |
Computer Security - ESORICS 2004: 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings
ISBN: 9783540229872 / Angielski / Miękka / 457 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13 15, 2004 in Sophia Antipolis, France. In response to the call for papers 159 papers were submitted to the conference. These papers were evaluated on the basis of their signi?cance, novelty, and te- nicalquality. Eachpaper wasreviewedby at leastthree members of the program committee. The program committee meeting was held electronically; there was an intensive discussion over a period of two weeks. Of the...
ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Secu...
|
cena:
200,77 |
![]() |
Formal Methods for Open Object-Based Distributed Systems: 8th IFIP WG 6.1 International Conference, FMOODS 2006, Bologna, Italy, June 14-16, 2006, Proceedings
ISBN: 9783540348931 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2006, held in Bologna, Italy, June 2006. The book presents 16 revised full papers together with an invited paper and abstracts of 2 invited talks. Coverage includes component- and model-based design, service-oriented computing, software quality, modeling languages implementation, formal specification, verification, validation, testing, and service-oriented systems. This book constitutes the refereed proceedings of the 8th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed ... |
cena:
200,77 |
![]() |
Information Security and Privacy: 11th Australasian Conference, Acisp 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
ISBN: 9783540354581 / Angielski / Miękka / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3 5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers, practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage...
The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3 5 July, 2006. The conference was sponsored ...
|
cena:
200,77 |
![]() |
Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
ISBN: 9783540240150 / Angielski / Miękka / 474 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Island, Korea in August 2004. The 36 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 169 submissions. The papers are organized in topical sections on network and computer security, public key systems, intrusion detection, watermarking and anti-spamming, digital rights management, e-commerce security, efficient implementations, anonymous communication, and side channel attacks.
This book constitutes the refereed proceedings of the 5th International Workshop on Information Security Applications, WISA 2004, held in Jeju Isla... |
cena:
200,77 |
![]() |
Concurrent Object-Oriented Programming and Petri Nets: Advances in Petri Nets
ISBN: 9783540419426 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Concurrency and distribution have become the dominant paradigm and concern in computer science. Despite the fact that much of the early research in object-oriented programming focused on sequential systems, objects are a natural unit of distribution and concurrency - as elucidated early on by research on the Actor model. Thus, models and theories of concurrency, the oldest one being Petri nets, and their relation to objects are an attractive topic of study.
This book presents state-of-the-art results on Petri nets and concurrent object-oriented programming in a coherent and competent way.... Concurrency and distribution have become the dominant paradigm and concern in computer science. Despite the fact that much of the early research in ob...
|
cena:
401,58 |
![]() |
Selected Areas in Cryptography: 9th Annual International Workshop, Sac 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers
ISBN: 9783540006220 / Angielski / Miękka / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen's University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), Univ- sity of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshopis to provide a relaxedatmosphere in which researchersin cr- tography can present and discuss new work on selected areasof current interest. The traditional themes for SAC workshops are: - Design and analysis of symmetric key cryptosystems. - Primitives for private-key...
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen's University in Kingston (1994, 1...
|
cena:
200,77 |
![]() |
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
ISBN: 9783540407317 / Angielski / Miękka / 210 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security... For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the br... |
cena:
200,77 |
![]() |
Engineering Self-Organising Systems: Methodologies and Applications
ISBN: 9783540261803 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexity of distributed interacting software and information handling systems. Self-organising applications are able to dynamically change their functionality and structure without direct user intervention to respond to changes in requirements and the environment. This book comprises revised and extended papers presented at the International Workshop on Engineering Self-Organising Applications, ESOA 2004, held in New York, NY, USA in July 2004... Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexi... |
cena:
200,77 |
![]() |
Embedded Software and Systems: Second International Conference, Icess 2005, Xi'an, China, December 16-18, 2005, Proceedings
ISBN: 9783540308812 / Angielski / Miękka / 784 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi'an, China, in December 2005. The 63 revised full papers presented together with the abstracts of 3 keynote speeches were thoroughly reviewed and selected from 361 submissions. The papers are organized in topical sections on embedded hardware, embedded software, real-time systems, power aware computing, hardware/software co-design and system-on-chip, testing and verification, reconfigurable computing, agent and distributed computing, wireless... This book constitutes the refereed proceedings of the Second International Conference on Embedded Software and Systems, ICESS 2005, held in Xi'an, ... |
cena:
401,58 |