Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the Third Latin-American Symposium on Dependable Computing, LADC 2007, held in Morelia, Mexico, in September 2007. The papers are organized in topical sections on fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, experimental dependability evaluation, as well as intrusion tolerance and security.
This book constitutes the refereed proceedings of the Third Latin-American Symposium on Dependable Computing, LADC 2007, held in Morelia, Mexico, in September 2007. The papers are organized in topical sections on fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, experimental dependability evaluation, as well as intrusion tolerance and security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Invited Talks.- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract).- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing?.- Fault-Tolerant Algorithms.- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation.- On the Implementation of Communication-Optimal Failure Detectors.- Connectivity in Eventually Quiescent Dynamic Distributed Systems.- Software Engineering of Dependable Systems.- Implementing Fault Tolerance Using Aspect Oriented Programming.- Architecture-Centric Fault Tolerance with Exception Handling.- Coverage-Oriented, Prioritized Testing - A Fuzzy Clustering Approach and Case Study.- Networking and Mobile Computing.- Error Propagation Monitoring on Windows Mobile-Based Devices.- Gossiping: Adaptive and Reliable Broadcasting in MANETs.- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios.- Experimental Dependability Evaluation.- Failure Boundedness in Discrete Applications.- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software.- Component-Based Software Certification Based on Experimental Risk Assessment.- Intrusion Tolerance and Security.- Integrated Intrusion Detection in Databases.- Security Rationale for a Cooperative Backup Service for Mobile Devices.- Tutorials.- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?.- Security Patterns and Secure Systems Design.- BAR-Where Distributed Computing Meets Game Theory.- Panels.- Scaling Dependability and Security in Ad Hoc Networks.- Assessing, Measuring, and Benchmarking Dependability and Resilience.
Invited Talks.- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract).- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing?.- Fault-Tolerant Algorithms.- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation.- On the Implementation of Communication-Optimal Failure Detectors.- Connectivity in Eventually Quiescent Dynamic Distributed Systems.- Software Engineering of Dependable Systems.- Implementing Fault Tolerance Using Aspect Oriented Programming.- Architecture-Centric Fault Tolerance with Exception Handling.- Coverage-Oriented, Prioritized Testing - A Fuzzy Clustering Approach and Case Study.- Networking and Mobile Computing.- Error Propagation Monitoring on Windows Mobile-Based Devices.- Gossiping: Adaptive and Reliable Broadcasting in MANETs.- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios.- Experimental Dependability Evaluation.- Failure Boundedness in Discrete Applications.- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software.- Component-Based Software Certification Based on Experimental Risk Assessment.- Intrusion Tolerance and Security.- Integrated Intrusion Detection in Databases.- Security Rationale for a Cooperative Backup Service for Mobile Devices.- Tutorials.- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?.- Security Patterns and Secure Systems Design.- BAR-Where Distributed Computing Meets Game Theory.- Panels.- Scaling Dependability and Security in Ad Hoc Networks.- Assessing, Measuring, and Benchmarking Dependability and Resilience.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826