You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Three speakers at the Second Workshop on Network Management and Control nostalgically remembered the INTEROP Conference at which SNMP was able to interface even to CD players and toasters. We agreed this was indeed a major step forward in standards, but wondered if anyone noticed whether the toast was burned, let alone, would want to eat it. The assurance of the correct operation of practical systems under difficult environments emerged as the dominant theme of the workshop with growth, interoperability, performance, and scalability as the primary sub-themes. Perhaps this thrust is un surprising, since about half the 100 or so attendees were from industry, with a strong contingency of users. Indeed the technical program co-chairs, Shivendra Panwar of Polytechnic and Walter Johnston of NYNEX, took as their assignment the coverage of real problems and opportunities in industry. Nevertheless we take it as a real indication of progress in the field that the community is beginning to take for granted the availability of standards and even the ability to detect physical, link, and network-level faults and is now expecting diagnostics at higher levels as well as system-wide solutions.
The last decade has seen a tremendous growth in the usage of the World Wide Web. The Web has grown so fast that it seems to be becoming an unusable and slow behemoth. Web caching is one way to tame and make this behemoth a friendly and useful giant. The key idea in Web caching is to cache frequently accessed content so that it may be used profitably later. This book focuses entirely on Web caching techniques. Much of the material in this book is very relevant for those interested in understanding the wide gamut of Web caching research. It will be helpful for those interested in making use of the power of the Web in a more profitable way. Audience and purpose of this book This book presents key concepts in Web caching and is meant to be suited for a wide variety of readers including advanced undergraduate and graduate students‚ programmers‚ network administrators‚ researchers‚ teachers‚ techn- ogists and Internet Service Providers (ISPs).
This set of proceedings contains the most significant papers presented at the third IFAC Workshop on Artificial Intelligence in Real-time Control, which was held from September 23-25, 1991 in the USA. In this workshop, although there were still some "exotic" applications, a more practical view of the applications and limitations of current AI technology dominated the participants' discussions. With its resultant focus on reliability and safety considerations, the workshop posed as many questions as it answered. It provides an excellent mirror of the current state-of-the-art which these proceedings are intended to illustrate.
Twenty-four contributions, intended for a wide audience from various disciplines, cover a variety of applications of heavy-tailed modeling involving telecommunications, the Web, insurance, and finance. Along with discussion of specific applications are several papers devoted to time series analysis, regression, classical signal/noise detection problems, and the general structure of stable processes, viewed from a modeling standpoint. Emphasis is placed on developments in handling the numerical problems associated with stable distribution (a main technical difficulty until recently). No index. Annotation copyrighted by Book News, Inc., Portland, OR
In recent years, tremendous research has been devoted to the design of database systems for real-time applications, called real-time database systems (RTDBS), where transactions are associated with deadlines on their completion times, and some of the data objects in the database are associated with temporal constraints on their validity. Examples of important applications of RTDBS include stock trading systems, navigation systems and computer integrated manufacturing. Different transaction scheduling algorithms and concurrency control protocols have been proposed to satisfy transaction timing data temporal constraints. Other design issues important to the performance of a RTDBS are buffer management, index accesses and I/O scheduling. Real-Time Database Systems: Architecture and Techniques summarizes important research results in this area, and serves as an excellent reference for practitioners, researchers and educators of real-time systems and database systems.
This book constitutes the refereed proceedings of the 11th International Conference on Modelling Tools and Techniques for Computer Communication System Performance Evaluation, TOOLS 2000, held in Schaumburg, IL, USA in March 2000. The 21 revised full papers presented were carefully reviewed and selected from a total of 49 submissions. Also included are 15 tool descriptions and one invited paper. The papers are organized in topical sections on queueing network models, optimization in mobile networks, stochastic Petri nets, simulation, formal methods and performance evaluation, and measurement tools and applications.
A crucial reference tool for the increasing number of scientists who depend upon sensor networks in a widening variety of ways. Coverage includes network design and modeling, network management, data management, security and applications. The topic covered in each chapter receives expository as well as scholarly treatment, covering its history, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
A broad introduction to cryptography—what it is, how it really works, what its future holds, and why every informed citizen should understand its basics. We all keep secrets—from our gym locker codes to our email passwords to our online interactions. And we choose to share those secrets only with those whom we trust. So, too, do organizations, businesses, governments, and armies. In this fascinating book Cryptography, Panos Louridas provides a broad and accessible introduction to cryptography, the art and science of keeping and revealing secrets. Louridas explains just how cryptography works to keep our communications confidential, tracing it back all the way to its ancient roots. Then h...
This monograph-like state-of-the-art survey presents the history, the key ideas, the success stories, and future challenges of performance evaluation and demonstrates the impact of performance evaluation on a variety of different areas through case studies in a coherent and comprehensive way. Leading researchers in the field have contributed 19 cross-reviewed topical chapters competently covering the whole range of performance evaluation, from theoretical and methodological issues to applications in numerous other fields. Additionally, the book contains one contribution on the role of performance evaluation in industry and personal accounts of four pioneering researchers describing the genesis of breakthrough results. The book will become a valuable source of reference and indispensable reading for anybody active or interested in performance evaluation.
Database systems of the next generation are likely to be inherently very complex due to the diversity of requirements placed on them. Incorporating active, real time, and temporal virtues in one database system is an arduous effort but is also a commend able one. This book presents the proceedings of the Second International Workshop on Active, Real Time, and Temporal Database Systems (ARTDB 97), held in Como, Milan, in September 1997. The aim of the workshop was to bring researchers together from the active and real time research communities, and to examine the current state of the art in active, real time, and temporal database systems. This book offers a collection of papers presented at ...