Concurrent processes can exhibit extremely complicated behavior, and
neither informal reasoning nor testing is reliable enough to establish their
correctness. In this thesis, we develop a new technique for the verification
of parallel programs. The technique is stated in terms of axioms and inference
rules, and it is used to prove...
The IBM Vienna Laboratory has made a significant contribution to the work on
the semantic description of computer systems. Both the operational semantics
descriptions ("VDL") and the later work on denotational semantics ("Meta-IV",
"VEM") contain interesting scientific ideas. Partly because of the large...
The journal Computing has established a series of supplement volumes the fourth
of which appears this year. Its purpose is to provide a coherent presentation of a
new topic in a single volume. The previous subjects were Computer Arithmetic
1977, Fundamentals of Numerical Computation 1980, and Parallel Processes and
Related Automata...
Significant advances in optical fiber technology have created a need for an
up-to-date book about optical fiber fusion splicing. Over the past 15 years,
a variety of new optical fibers including rare-earth-doped fiber, dispersioncompensating
fiber, dispersion-matched fiber pairs, and microstructured fiber
have been introduced. These...
Every year ESWC brings together researchers and practitioners dealing with
different aspects of semantic technologies. Following a successful re-launch in
2010 as a multi-track conference, the 8th Extended Semantic Web Conference
built on the success of the ESWC conference series initiated in 2004. Through its
extended concept this...
This book is primarily an introduction to the design of algorithms for problem solving.
Its prominent feature is to use a functional language as an implementation language.
Because of the high level of abstraction provided, functional programs tend to be shorter,
clearer and faster to develop than their imperative counterparts. This...
This book is designed to accompany a final year undergraduate or masters level
course in pervasive computing, although it could serve well as a course for introducing
sensors or experiment design to students in earlier years at university with
some skimming over the research focus; or equally as a getting-started guide for
PhD level...
This book is all about wrangling a herd of network computers so that all
display the correct time. This may seem like a really narrow business,
but the issues go far beyond winding the clock on your display taskbar.
Carefully coordinated, reliable, and accurate time is vital for traffic control
in the air and on the ground, buying and...
This work deals with a well-defined class of probabilistic models. The focus
is on polymers. More precisely I should say that the focus is on the
equilibrium statistical mechanics of a class of polymers: dynamical and
non-equilibrium phenomena are not treated, reflecting the fact that these
directions are at the moment...
Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...
If your intention is to improve, not just pick up some "tricks," you
should understand exactly what is going on with the most mportant part
of the riding package, the rider. After all. whether your bike works well
or not is measured in ten/thousandths of inches and millimeters, that's
how far machine technology has...
Penetration testing is often considered an art as much as it is a science, but even an
artist needs the right brushes to do the job well. Many commercial and open source
tools exist for performing penetration testing, but it’s often hard to ensure that you
know what tools are available and which ones to use for a certain task....