You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
At times when the IT manager’s best friend is systems consolidation (which is a euphemism for centralisation), it may come somewhat as a surprise for you that this book investigates decentralisation in the context of content management systems. It may seem quite obvious that content will and should be managed by the party who creates and owns the content, and hence should be held in a—somewhat—centralised and managed location. However, over the past few years, we have been witnesses of some important trends and developments which call for novel ways of thinking about content management and maybe even broader, about computer systems in general. First, ongoing business globalization crea...
Adaptation of applied information and communication technologies (ICT) research results is one of the greatest challenges faced in building the global knowledge economy. This set of two books brings together a collection of contributions on commercial, government or societal exploitation of applied ICT.
This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, France in October/November 2006. The 191 revised full papers presented were carefully reviewed and selected from a total of 493 submissions to the workshops. The first volume begins with 26 additional revised short or poster papers of the OTM 2006 main conferences.
The ATOP (Agent-Based Technologies and Applications for Enterprise Interoperability) workshop series focuses on technologies that support interoperability in networked organizations, on successful applications of these technologies, and on lessons learned. So far two ATOP workshops have been held at the AAMAS conferences in Utrecht, The Netherlands, in July 2005, and in Estoril, Portugal, in May 2008. The 13 papers presented here are extended versions of carefully reviewed and selected contributions to the workshops. The topics covered are business interoperability; organizations and virtual institutions; modeling multiagent systems; agent interaction; and security. The main goal was to collect approaches for the application of agent technologies in these areas. Current trends in the development of agent technologies are compared with recent developments in service-oriented and model-driven system design, with respect to their ability to solve interoperability problems.
This book constitutes the refereed proceedings of the 7th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2007, held in Paphos, Cyprus in June 2007. It covers current research in context-awareness, adaptation, mobility, distributed applications and peer-to-peer computing, all of which relate to the sustainability of distributed applications and integrated systems.
This book constitutes the refereed proceedings of the 6th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2006, held in Bologna, Italy, June 2006. The book presents 21 revised regular and 5 revised work-in-progress papers, on architectures, models, technologies and platforms for interoperable, scalable and adaptable systems and cover subjects as methodological aspects, tools and language of building adaptable distributed and interoperable services, and many more.
Designing distributed computing systems is a complex process requiring a solid understanding of the design problems and the theoretical and practical aspects of their solutions. This comprehensive textbook covers the fundamental principles and models underlying the theory, algorithms and systems aspects of distributed computing. Broad and detailed coverage of the theory is balanced with practical systems-related issues such as mutual exclusion, deadlock detection, authentication, and failure recovery. Algorithms are carefully selected, lucidly presented, and described without complex proofs. Simple explanations and illustrations are used to elucidate the algorithms. Important emerging topics such as peer-to-peer networks and network security are also considered. With vital algorithms, numerous illustrations, examples and homework problems, this textbook is suitable for advanced undergraduate and graduate students of electrical and computer engineering and computer science. Practitioners in data networking and sensor networks will also find this a valuable resource. Additional resources are available online at www.cambridge.org/9780521876346.
Interest in biological rhythms has been traced back more than 2,500]ears to Archilochus, the Greek poet, who in one of his fragments suggests ",,(i,,(VWO'KE o'olos pv{}J.tos txv{}pW7rOVS ~XH" (recognize what rhythm governs man) (Aschoff, 1974). Reference can also be made to the French student of medicine J. J. Virey who, in his thesis of 1814, used for the first time the expression "horloge vivante" (living clock) to describe daily rhythms and to D. C. W. Hufeland (1779) who called the 24-hour period the unit of our natural chronology. However, it was not until the 1930s that real progress was made in the analysis of biological rhythms; and Erwin Bunning was encouraged to publish the first, and still not outdated, monograph in the field in 1958. Two years later, in the middle of exciting discoveries, we took a breather at the Cold Spring Harbor Symposium on Biological Clocks. Its survey on rules considered valid at that time, and Pittendrigh's anticipating view on the temporal organization of living systems, made it a milestone on our way from a more formalistic description of biological rhythms to the understanding of their structural and physiological basis.
A novel, model-driven approach to security requirements engineering that focuses on socio-technical systems rather than merely technical systems. Security requirements engineering is especially challenging because designers must consider not just the software under design but also interactions among people, organizations, hardware, and software. Taking this broader perspective means designing a secure socio-technical system rather than a merely technical system. This book presents a novel, model-driven approach to designing secure socio-technical systems. It introduces the Socio-Technical Modeling Language (STS-ML) and presents a freely available software tool, STS-Tool, that supports this d...