You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Data management systems play the most crucial role in building large application s- tems. Since modern applications are no longer single monolithic software blocks but highly flexible and configurable collections of cooperative services, the data mana- ment layer also has to adapt to these new requirements. Therefore, within recent years, data management systems have faced a tremendous shift from the central management of individual records in a transactional way to a platform for data integration, fede- tion, search services, and data analysis. This book addresses these new issues in the area of data management from multiple perspectives, in the form of individual contributions, and it outl...
This book provides a systematic in-depth investigation of a class of multiple-context assumption-based multiagent reasoning problems, typical, e.g., for distributed planning, scheduling, and control. First, logical and architectural foundations are provided to construct the two systems XFRMS and MXFRMS allowing the development of more complex utilities. Then the technology developed for XFRMS in the single-agent case is further enhanced to the multiagent situation. The multiagent RMS MXFRMS provides, along with XFRMS, a solid foundation for building more complex utilities, such as plan or schedule maintenance systems. In the final chapter, the software engineer confronted with the task of building a practicable multiagent system can find a discussion of potential uses and future extensions of the systems provided.
Parallel computer architectures are now going to real applications! This fact is demonstrated by the large number of application areas covered in this book (see section on applications of parallel computer architectures). The applications range from image analysis to quantum mechanics and data bases. Still, the use of parallel architectures poses serious problems and requires the development of new techniques and tools. This book is a collection of best papers presented at the first workshop on two major research activities at the Universitiit Erlangen-Niirnberg and Technis che Universitiit Miinchen. At both universities, more than 100 researchers are working in the field of multiprocessor s...
The Database and Expert Systems Application -DEXA - conferences are mainly oriented to establish a state-of-the art forum on Database and Expert System applications. But Practice without Theory has no sense, as Leonardo said five centuries ago. In this Conference we try a comprornise between these two complementary aspects. A total of 5 sessions are application-oriented, ranging from classical applications to more unusual ones in Software Engineering. Recent research aspects in Databases, such as activity, deductivity and/or Object Orientation are also present in DEXA 92, as weIl as the implication of the new "data models" such as OO-Model, Deductive Model, etc .. included in the Modelling s...
This book constitutes the refereed proceedings of the 27th International Symposium on Mathematical Foundations of Computer Science, MFCS 2002, held in Warsaw, Poland in August 2002. The 48 revised full papers presented together with 5 invited papers were carefully reviewed and selected from 108 submissions. All relevant aspects of theoretical computer science are addressed, ranging from discrete mathematics, combinatorial optimization, graph theory, algorithms, and complexity to programming theory, formal methods, and mathematical logic.
Censorship had an extraordinary impact on Alban Berg's opera Lulu, composed by the Austrian during the politically tumultuous years spanning 1929 to 1935. Based on two plays by Frank Wedekind that were repeatedly banned from publishing and performing up until the end of World War I, thelibretto was in turn censored by Berg himself when he submitted it to authorities in Nazi Germany in 1934. When Berg died before the opera was debuted the next season, the third act was censored by his widow, Helene, and his former teacher, Arnold Schoenberg.In "Taken By the Devil", author Margaret Notley uncovers the unusual and uniquely generative role of censorship throughout the lifecycle of Berg's great o...
How can we optimize differentiating business processes and exploit their full potential? Here Volker Stiehl provides answers, utilizing the various options that the BPMN (Business Process Model and Notation) standard offers for planning, implementing and monitoring processes. The book presents an approach for implementing an architecture for applications that strives to find a balance between development and maintenance costs, sustainability, scalability and fault tolerance; that meets flexibility requirements without becoming inordinately complex itself; and that keeps the end application as abstract as possible from the system landscape in which it operates. Based on the semantic enhanceme...
"This conference will focus on the user-oriented development of information systems. Against a background of recent concepts for the implementation of distributed systems based on workstation computers, various communicational, organizational and social issues gain increasing importance in the construct ion of computer based information systems. There is an urgent need to integrate end-users and other affected groups into the development process. New strategies for system development are thus needed. " This was the beginning of the Call for Papers to the Working Conference on Prototyping. Working in the fields of user-oriented software construct ion and the analysis of communication problems...
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.
Contemporary Educational Researches: Theory and Practice in Education.