You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered. There has never been any effort to write a comprehensive history....
System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.This book summarizes the state of research and practice in this ...
This book is dedicated to Professor Ernst--Rüdiger Olderog on the occasion of his 60th birthday. This volume is a reflection on Professor Olderog's contributions to the scientific community. It provides a sample of research ideas that have been influenced directly by Ernst-Rüdiger Olderog's work. After a laudatio section that provides a brief overview of Ernst-Rüdiger Olderog's research, the book is comprised of five parts with scientific papers written by colleagues and collaborators of Professor Olderog. The papers address semantics, process algebras, logics for verification, program analysis, and synthesis approaches.
This book is dedicated to Professor Martin Wirsing on the occasion of his emeritation from Ludwig-Maximilians-Universität in Munich, Germany. The volume is a reflection, with gratitude and admiration, on Professor Wirsing’s life highly creative, remarkably fruitful and intellectually generous life. It also gives a snapshot of the research ideas that in many cases have been deeply influenced by Professor Wirsing’s work. The book consists of six sections. The first section contains personal remembrances and expressions of gratitude from friends of Professor Wirsing. The remaining five sections consist of groups of scientific papers written by colleagues and collaborators of Professor Wirsing, which have been grouped and ordered according to his scientific evolution. More specifically, the papers are concerned with logical and algebraic foundations; algebraic specifications, institutions and rewriting; foundations of software engineering; service oriented systems; and adaptive and autonomic systems.
Promise Theory bridges the worlds of semantics and dynamics to describe scalable interactions between autonomous agents that form clusters and groups. It provides a broadly developed and semi-formal language, which builds on the mathematics of sets and graphs, and models intent and outcome in an impartial manner. The result is a theory that expresses a `chemistry' of cooperative behaviours for a wide range of systems, emphasizing how each new scale of cooperation leads to new phenomena and new promises.This book is aimed at scientists, philosophers, and engineers. It introduces readers to the key concepts in a practical manner, building on the foundation of voluntary cooperation as a ground ...
This book introduces a process calculus for parallel, distributed and reactive systems. It describes the conceptual foundations as well as the mathematical theory behind a programming language, and a number of application examples. The chosen approach provides a framework for understanding the semantics of parallel and distributed systems. Moreover, it can be directly applied to practical problems.
The refereed proceedings of the 30th International Colloquium on Automata, Languages and Programming, ICALP 2003, held in Eindhoven, The Netherlands in June/July 2003. The 84 revised full papers presented together with six invited papers were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on algorithms, process algebra, approximation algorithms, languages and programming, complexity, data structures, graph algorithms, automata, optimization and games, graphs and bisimulation, online problems, verification, the Internet, temporal logic and model checking, graph problems, logic and lambda-calculus, data structures and algorithms, types and categories, probabilistic systems, sampling and randomness, scheduling, and geometric problems.
CONCUR'91 is the second international conference on concurrency theory, organized in association with the NFI project Transfer. It is a sequel to the CONCUR'90 conference. Its basic aim is to communicate ongoing work in concurrency theory. This proceedings volume contains 30 papers selected for presentation at the conference (from 71 submitted) together with four invited papers and abstracts of the other invited papers. The papers are organized into sections on process algebras, logics and model checking, applications and specification languages, models and net theory, design and real-time, tools and probabilities, and programming languages. The proceedings of CONCUR'90 are available asVolume 458 of Lecture Notes in Computer Science.