You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The stock market crashes, threatening to bring Plymouth’s secret magical “Wise” families down with it. When Bill and Millie’s precognitive Uncle Finn threatens to usurp their father and take control of all the Wise families, the twins realize they must stop him. Bill’s telepathic powers and ambition aren’t enough to outmaneuver his uncle, even with help from his sister and their similarly powered friends. Uncle Finn has an alliance with the Irish Mob up in Boston. Bill needs connections and there’s only one place to do that in this town. The Plymouth Supper Club hides hooch and rumrunners like a backdrop covers warehouse walls on Poverty Row. Bill is ready to jump in with both feet but Millie wants out of this town, not a piece of its action. Can they wise up together or will the prospect of criminal life drive their friends and family apart? Decopunk Hopepunk Roaring 20s Prohibition Rumrunner Bootlegger Italian Mafia Speakeasy Alternate History Historical Urban Fantasy Organized Crime Supernatural Suspense Thriller Fantasy
Communication networks and computer systems research is entering a new phase in which many of the established models and techniques of the last twenty years are being challenged. The research community is continuing to free itself from past intellectual constraints so that it may fully exploit the convergence of computing and communications. Evaluating the performance of emerging communications and computer systems constitutes a huge challenge. Thus, current research provides a set of heterogeneous tools and techniques embracing the uncertainties of time and space varying environments when the requests for diverse services are made in real time, and with very different quality of service exp...
Although the last decade has witnessed significant advances in control theory for finite and infinite dimensional systems, the stability and control of time-delay systems have not been fully investigated. Many problems exist in this field that are still unresolved, and there is a tendency for the numerical methods available either to be too general or too specific to be applied accurately across a range of problems. This monograph brings together the latest trends and new results in this field, with the aim of presenting methods covering a large range of techniques. Particular emphasis is placed on methods that can be directly applied to specific problems. The resulting book is one that will be of value to both researchers and practitioners.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Critical Information Infrastructures Security, CRITIS 2008, held in Rome, Italy, in October 2008. The 39 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. All the contributions highlight the current development in the field of Critical (Information) Infrastructures and their Protection. Specifically they emphasized that the efforts dedicated to this topic are beginning to provide some concrete results. Some papers illustrated interesting and innovative solutions devoted to understanding, analyzing and modeling a scenario composed by several heterogeneous and interdependent infrastructures. Furthermore, issues concerning crisis management scenarios for interdependent infrastructures have been illustrated. Encouraging preliminarily results have been presented about the development of new technological solutions addressing self-healing capabilities of infrastructures, that is regarded as one of the most promising research topics to improve the infrastructures' resilience.
The focus of the book is on completed implementations of agent-based software systems. Here, agent technology is considered broadly, starting from development of agent platforms, all the way through systems actually implemented. The covered topics also include lessons learned during implementation of agent platforms and the reflection on the process of development and application of agent-based systems. The book includes 10 chapters where interested reader can find discussion of important issues encountered during development of well-known agent platforms such as JADE and Jadex as well as some interesting experiences in developing a new platform that combines software agent and Web Services. Furthermore, the book shows readers several valuable examples of applications based on multi-agent systems including simulations, agents in autonomous negotiations and agents in public administration modelling. We believe that the book will prove useful to the researchers, professors and the practitioners in all disciplines including science and technology.
This book presents revised versions of tutorial lectures given at the IEEE/CS symposium on modeling, analysis, and simulation of computer and telecommunication systems held in Orlando, FL, USA in October 2003. The lectures are grouped in three parts on performance and QoS of modern wired and wireless networks, current advances in performance modeling and simulation, and other specific applications of these methodologies. This tutorial book is targeted to both practitioners and researchers. The practitioner will benefit from numerous pointers to performance and QoS issues; the pedagogical style and plenty of references can be of great use in solving practical problems. The researcher and advanced student are offered a representative set of topics not only for their research value but also for their novelty and use in identifying areas of active research.
Based on a rigorous selection from 58 proposals coming from across the world, this volume will include some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will offer the reader with a timely access to innovative research from many different areas of the world where advances in computing and communications are created.
This book constitutes the refereed proceedings of the First IFIP TC6 Working Conference on Wireless On-Demand Network Systems, WONS 2004, held in Madonna di Campiglio, Italy in January 2004. The 25 revised full papers presented together with 7 short papers were carefully reviewed and selected from 77 submissions. The papers are organized in topical sections on localization and mobility management; MAC and radio resource management; Bluetooth scatternets; ad-hoc routing; security, applications, and service support; MAC analytical models; and on-demand Internet access.
This book constitutes the proceedings of the 4th International Workshop on Critical Information Infrastructures Security, CRITIS 2009, held in Bonn, Germany, during September 30 to October 2, 2009.
This book constitutes the thoroughly refereed postproceedings of the 11th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2005, held in Cambridge, MA, USA in June 2005 in conjunction with the 19th ACM International Conference on Supercomputing (ICS 2005). The 13 revised full research papers presented went through two rounds of reviewing and improvement. The papers in this volume cover a wide range of parallel architectures, from distributed grids, through clusters, to massively-parallel supercomputers. They are organized in topical sections on modeling and workloads, implementations and deployments, grid scheduling, as well as evaluation and metrics.