You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
First multi-year cumulation covers six years: 1965-70.
This book constitutes the refereed proceedings of the First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, held in Oslo, Norway in June 2007. It covers scalable network management, inter-domain concepts, promises and ubiquitous management, autonomous infrastructure and security, management models, policy interactions, security management, logic and validation, and networks.
Can psychoanalysis offer a new computer model? Can computer designers help psychoanalysts to understand their theory better?In contemporary publications human psyche is often related to neural networks. Why? The wiring in computers can also be related to application software. But does this really make sense? Artificial Intelligence has tried to implement functions of human psyche. The reached achievements are remarkable; however, the goal to get a functional model of the mental apparatus was not reached. Was the selected direction incorrect?The editors are convinced: yes, and they try to give answers here. If one accepts that the brain is an information processing system, then one also has to accept that computer theories can be applied to the brain’s functions, the human mental apparatus. The contributors of this book - Solms, Panksepp, Sloman and many others who are all experts in computer design, psychoanalysis and neurology are united in one goal: finding synergy in their interdisciplinary fields.
This book constitutes the refereed proceedings of the 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2003, held in Heidelberg, Germany in October 2002. The 20 revised full papers and 6 revised short papers presented together with a keynote paper were carefully reviewed and selected from a total of 105 submissions. The papers are organized in topical sections on self-configuration, peer-to-peer management, self-optimization and performance management, utility management, self-protection and access control, manageability and instrumentation, and context-awareness.
This book constitutes the refereed proceedings of the 16th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2005, held in Barcelona, Spain, in October 2005. The 23 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on information models and metrics, security and privacy, policy-based management, deployment, auditing and tuning, performance and quality of service, routing, fault management, and distributed management.
This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015. The 16 full papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections on measurement tools and methods; mobile and wireless; Web; security; and new protocols.
This book constitutes the refereed proceedings of the Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008, held in Bremen, Germany, in June 2008, under the auspices of IFIP. The 13 revised full papers presented together with 8 papers of the AIMS PhD workshop were carefully reviewed and selected from 33 submissions to the main conference and 12 papers for the PhD workshop respectively. The papers are discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault recovery, network traffic engineering and analysis, and convergent behavior of distributed systems.
Recent years have witnessed the appearance of new paradigms for designing distributed applications where the application components can be relocated - namically across the hosts of the network. This form of code mobility lays the foundation for a new generation of technologies, architectures, models, and - plications in which the location at which the code is executed comes under the control of the designer, rather than simply being a con?guration accident. Among the various ?avors of mobile code, the mobile agent paradigm has become particularly popular. Mobile agents are programs able to determine - tonomously their own migration to a di?erent host, and still retain their code and state (o...
This tutorial contains written versions of seven lectures on Computational Combinatorial Optimization given by leading members of the optimization community. The lectures introduce modern combinatorial optimization techniques, with an emphasis on branch and cut algorithms and Lagrangian relaxation approaches. Polyhedral combinatorics as the mathematical backbone of successful algorithms are covered from many perspectives, in particular, polyhedral projection and lifting techniques and the importance of modeling are extensively discussed. Applications to prominent combinatorial optimization problems, e.g., in production and transport planning, are treated in many places; in particular, the book contains a state-of-the-art account of the most successful techniques for solving the traveling salesman problem to optimality.
USM 2000 is the third event in a series of international IFIP/GI conferences on Trends in Distributed Systems. Following the venues in Aachen, Germany (1996) and Hamburg, Germany (1998), this event in Munich considers the trend towards a Universal Service Market – USM 2000. The trend towards a universal service market has many origins, e.g., the integration of telecom and data communications, the deregulation e?orts with respect to telco markets, the globalization of information, the virtualization of companies, the requirement of a short time-to-market, the advances in network technologies, the increasing acceptance of e-commerce, and the increase in - bility. This leads to new business-t...