![]() |
Network-Based Parallel Computing. Communication, Architecture, and Applications: Second International Workshop, Canpc'98, Las Vegas, Nevada, Usa, Janu
ISBN: 9783540641407 / Angielski / Miękka / 250 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the strictly refereed proceedings of the Second International Workshop on Communication and Architectural Support for Network-Based Parallel Computing, CANPC'98, held in Las Vegas, Nevada, USA, in January/February 1998.
The 18 revised full papers presented were selected from 38 submissions on the basis of four to five reviews per paper. The volume comprises a representative compilation of state-of-the-art solutions for network-based parallel computing. Several new interconnection technologies, new software schemes and standards are studied and developed to provide... This book constitutes the strictly refereed proceedings of the Second International Workshop on Communication and Architectural Support for Network-Ba...
|
cena:
201,24 |
![]() |
Multiagent Systems: A Theoretical Framework for Intentions, Know-How, and Communications
ISBN: 9783540580263 / Angielski / Miękka / 174 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Distributed computing is of great significance in current and future reserach and applications of computer science. As a consequence, in artificial intelligence we can observe rapid growth in the subfield of distributed artificial intelligence (DAI). In particular research on multiagent systems and their potential applications currently attract a lot of interest.
This monograph presents recent research and an introductory survey on multiagent systems and some other aspects of DAI. The author describes these systems as composed of intelligent entities, the agents, with intentions, beliefs,... Distributed computing is of great significance in current and future reserach and applications of computer science. As a consequence, in artificial in...
|
cena:
140,86 |
![]() |
Digitale Visionen: Zur Gestaltung Allgegenwärtiger Informationstechnologien
ISBN: 9783540770213 / Niemiecki / Twarda / 194 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Allgegenwartige, in den Hintergrund tretende Informationstechniken konnten den Menschen in allen Lebensbereichen bei der Arbeit, beim Einkaufen, beim Reisen und zu Hause unbemerkt und mitdenkend" unterstutzen. Eine solche Entwicklung bietet nicht nur die Vision, intellektuelle und physische Begrenzungen des Menschen zu uberwinden, sondern auch viele neue Herausforderungen fur bisherige Werte und Lebensweisen. Daher drangt sich die Frage auf, wie wir angesichts dieser Moglichkeiten kunftig leben wollen und wie wir die vor uns stehenden Entwicklungen beeinflussen konnen. Das Buch beschreibt... Allgegenwartige, in den Hintergrund tretende Informationstechniken konnten den Menschen in allen Lebensbereichen bei der Arbeit, beim Einkaufen, be... |
cena:
169,28 |
![]() |
Security Protocols: 13th International Workshop, Cambridge, Uk, April 20-22, 2005, Revised Selected Papers
ISBN: 9783540771555 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was The systemlikes youandwants to be yourfriend. Security is usually seen as making...
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After tha...
|
cena:
201,24 |
![]() |
Job Scheduling Strategies for Parallel Processing: Ipps '96 Workshop, Honolulu, Hawaii, April 16, 1996. Proceedings
ISBN: 9783540618645 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the strictly refereed post-workshop proceedings of the International Workshop on Job Scheduling Strategies for Parallel Processing, held in conjunction with IPPS '96 symposium in Honolulu, Hawaii, in April 1996.
The book presents 15 thoroughly revised full papers accepted for inclusion on the basis of the reports of at least five program committee members. The volume is a highly competent contribution to advancing the state-of-the-art in the area of job scheduling for parallel supercomputers. Among the topics addressed are job scheduler, workload evolution, gang... This book constitutes the strictly refereed post-workshop proceedings of the International Workshop on Job Scheduling Strategies for Parallel Processi...
|
cena:
201,24 |
![]() |
State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures
ISBN: 9783540654742 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer...
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of c...
|
cena:
201,24 |
![]() |
Information Security and Privacy: Third Australasian Conference, Acisp'98, Brisbane, Australia July 13-15, 1998, Proceedings
ISBN: 9783540647324 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures. This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, A...
|
cena:
201,24 |
![]() |
Software and Compilers for Embedded Systems: 8th International Workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004, Proceedings
ISBN: 9783540230359 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in A- terdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was referred to as the International Workshop on Code Generation for Emb- ded Systems. The ?rst took place in 1994 in Schloss Dagstuhl, Germany. From its beginnings, the intention of the organizers has been to create an interactive atmosphere in which the participants can discuss and pro't from the assembly of international experts in the ?eld. The name SCOPES has been used...
This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in A- terdam,...
|
cena:
201,24 |
![]() |
Software Security - Theories and Systems: Second Mext-Wsf-Jsps International Symposium, Isss 2003, Tokyo, Japan, November 4-6, 2003
ISBN: 9783540236351 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4 6, 2003. This volume is the collection of the papers that were presented at ISSS 2003. The proceedings of ISSS 2002 was published as LNCS 2609. Although the security and reliability of software systems for networked c- puter systems are major concerns of current society, the technology for software securitystillneedstobedevelopedinmanydirections.SimilartoISSS2002, ISSS 2003...
Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 ...
|
cena:
201,24 |
![]() |
Mobile Agents for Telecommunication Applications: Second International Workshop, Mata 2000, Paris, France, September 18-20, 2000 Proceedings
ISBN: 9783540410690 / Angielski / Miękka / 269 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mobile agents refer to self-contained and identi?able computer programs that can move within the network and can act on behalf of the user or another entity. Most of the current research work on the mobile agent paradigm has two general goals: reduction of network traf?c and asynchronous interaction. These two goals stem directly from the desire to reduce information overload and to ef?ciently use network resources. There are certainly many motivations for the use of a mobile agent paradigm; h- ever, intelligent information retrieval, network and mobility management, and network services are...
Mobile agents refer to self-contained and identi?able computer programs that can move within the network and can act on behalf of the user or another ...
|
cena:
201,24 |
![]() |
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000. Proceedings
ISBN: 9783540417248 / Angielski / Miękka / 234 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.
This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides... Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services ...
|
cena:
201,24 |
![]() |
Quality of Service - Iwqos 2001: 9th International Workshop Karlsruhe, Germany, June 6-8, 2001. Proceedings
ISBN: 9783540422174 / Angielski / Miękka / 434 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Workshop on Quality of Service, IWQoS 2001, held in Karlsruhe, Germany, in June 2001. abstracts of invited contributions were carefully reviewed and selected from a total of close to 150 submissions. systems QoS, routing, TCP related issues, wireless and mobile networking, aggregation and active networks based QoS, scheduling and dropping, and scheduling and admission control.
This book constitutes the refereed proceedings of the 9th International Workshop on Quality of Service, IWQoS 2001, held in Karlsruhe, Germany, in Jun...
|
cena:
201,24 |
![]() |
Security Protocols: 8th International Workshops Cambridge, Uk, April 3-5, 2000 Revised Papers
ISBN: 9783540425663 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don t insist they relate to the current theme in an obvious way. In our experience, the emergence of the theme as a unifying threadtakesplaceduringthediscussionsattheworkshopitself.Theonlyground rule is that position papers should formulate an approach to some unresolved issues, rather than being a description of a ?nished...
The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of se...
|
cena:
201,24 |
![]() |
Foundations of Security Analysis and Design: Tutorial Lectures
ISBN: 9783540428961 / Angielski / Miękka / 405 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September.
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, ...
|
cena:
201,24 |
![]() |
Advances in Cryptology - Eurocrypt 2002: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, the Netherlan
ISBN: 9783540435532 / Angielski / Miękka / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.
The 33 revised full papers presented were carefully reviewed and selected from a total of 122 submissions. The papers are organized in topical sections on cryptanalysis, public-key encryption, information theory and new models, implementational analysis, stream ciphers, digital signatures, key exchange, modes of operation, traitor tracing and id-based encryption, multiparty and... This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 20...
|
cena:
402,53 |
![]() |
Information Security and Privacy: 7th Australian Conference, Acisp 2002 Melbourne, Australia, July 3-5, 2002 Proceedings
ISBN: 9783540438618 / Angielski / Miękka / 516 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3-5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy....
The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3-5July, 2002. The conference was sponsored by ...
|
cena:
402,53 |
![]() |
Advanced Internet Services and Applications: First International Workshop, Aisa 2002, Seoul, Korea, August 1-2, 2002. Proceedings
ISBN: 9783540439684 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The rapid growth of the Internet and related services is changing the way we work, act, and even think in a manner that far exceeds the prediction set by ?eld experts not long ago. It is now common belief that the Internet and its various applications covering both hardware appliances and software products will play an increasingly important role in everybody s daily lives. It is also our strong belief that the importance of the collaborative research and development e?orts focusing on the Internet among academia, industry, and regulating government bodies cannot be overemphasized. It is our...
The rapid growth of the Internet and related services is changing the way we work, act, and even think in a manner that far exceeds the prediction set...
|
cena:
201,24 |
![]() |
Objects, Components, Architectures, Services, and Applications for a Networked World: International Conference Netobjectdays, Node 2002, Erfurt, Germa
ISBN: 9783540007371 / Angielski / Miękka / 434 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the thoroughly refereed post-proceedings of the international conference NetObjectDays 2002, held in Erfurt, Germany, in October 2002. The 26 revised full papers presented were carefully selected during two rounds of reviewing and revision. The papers are organized in topical sections on embedded and distributed systems; components and MDA; Java technology; Web services; aspect-oriented software design; agents and mobility; software product lines; synchronization; testing, refactoring, and CASE tools.
This book constitutes the thoroughly refereed post-proceedings of the international conference NetObjectDays 2002, held in Erfurt, Germany... |
cena:
201,24 |
![]() |
Privacy Enhancing Technologies: Third International Workshop, Pet 2003, Dresden, Germany, March 26-28, 2003, Revised Papers
ISBN: 9783540206101 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Privacy Enhancing Technologies, PET 2002, held in Dresden, Germany in March 2003.The 14 revised full papers presented were carefully selected from 52 submissions during two rounds of reviewing and improvement. Among the topics addressed are mix-networks, generalized mixes, unlinkability, traffic analysis prevention, face recognition, privacy legislation, Web censorship, anonymous networking, personalized Web-based systems, and privacy in enterprises.
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Privacy Enhancing Technologies, PET 2002, held i...
|
cena:
201,24 |
![]() |
Information Security and Privacy: 9th Australasian Conference, Acisp 2004, Sydney, Australia, July 13-15, 2004, Proceedings
ISBN: 9783540223795 / Angielski / Miękka / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference was sponsored by the Centre for Advanced Computing - Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography,...
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13-15 July, 2004. The conference was sponsored by...
|
cena:
402,53 |