|
|
|
|
|
Objects, Agents, and Features: International Seminar, Dagstuhl Castle, Germany, February 16-21, 2003, Revised and Invited PapersThis book is the outcome of an international research seminar on objects, agents, and features held at Dagstuhl Castle, Germany in February 2003.
In recent years, concepts in object-oriented modeling and programming have been extended in variuos directions, giving rise to new paradigms such as agent-orientation and feature orientation. This... | | Interactive Systems. Design, Specification, and Verification: 13th International Workshop, DSVIS 2006, Dublin, Ireland, July 26-28, 2006, Revised PapersThis book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Design, Specification, and Verification of Interactive Systems, DSVIS 2006, held in Dublin, Ireland in July 2006.
The 19 revised full papers presented together with 1 keynote paper, and 2 working group reports were carefully reviewed and... | | Performance by Design: Computer Capacity Planning By ExamplePractical systems modeling: planning performance, availability, security, and more
Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of... |
|
Tini Specification and Developer's Guide"Youll be amazed when you first see a Web server running on a computer thats little bigger than a stick of chewing gum." --From the Foreword by Tom Cargill
TINI™ (Tiny InterNet Interface) technology is the compact and powerful solution for connecting a wide variety of hardware devices directly to corporate and home... | | Wireless Security and Cryptography: Specifications and ImplementationsAs the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which... | | |
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |