You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The goal of enterprise integration is the development of computer-based tools that facilitate coordination of work and information flow across organizational boundaries. These proceedings, the first on EI modeling technologies, provide a synthesis of the technical issues involved; describe the various approaches and where they overlap, complement, or conflict with each other; and identify problems and gaps in the current technologies that point to new research.The leading edge of a movement that began with computer-aided design/computer-aided manufacturing (CAD/CAM), EI now seeks to engage the development of computer-based tools to control not only manufacturing but the allied areas of mater...
In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB. When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information. Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.
This volume of the Lecture Notes in Computer Science series contains all the papers accepted for presentationat the second IEEE InternationalWorkshopon Self-Managed Networks, Systems and Services (SelfMan 2006), which was held at University College Dublin, Ireland on June 16, 2006. This workshop follows up on a very successful edition that took place last year in Nice, France. The online proceedings of SelfMan 2005 are available at http://madynes.loria.fr/selfman2005/. The objectives of this year's edition were to bring together people from d- ferent communities (networking, distributed systems, softwareengineering, P2P, service engineering, distributed arti?cial intelligence, robotics, etc....
Whether or not you use a computer, you probably use a telephone, electric power, and a bank. Although you may not be aware of their presence, networked computer systems are increasingly becoming an integral part of your daily life. Yet, if such systems perform poorly or don't work at all, then they can put life, liberty, and property at tremendous risk. Is the trust that weâ€"as individuals and as a societyâ€"are placing in networked computer systems justified? And if it isn't, what can we do to make such systems more trustworthy? This book provides an assessment of the current state of the art procedures for building trustworthy networked information systems. It proposes directions fo...
This book constitutes the refereed proceedings of the 17th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2006, held in Dublin, Ireland in October 2006 in the course of the 2nd International Week on Management of Networks and Services, Manweek 2006. The 21 revised full papers and four revised short papers presented were carefully reviewed and selected from 85 submissions.
description not available right now.
IT systems have a high impact on organizations and businesses today and are a key to globalization. Evolution of complexity calls for changes in the way these systems are built and managed. As a consequence, a paradigm shift towards Model-Driven Engineering and Policy-Based Management can be observed, both aiming at a better management of complexity. A lot of human effort is still necessary to develop and operate complex systems. In this thesis, an innovative approach to reduce that effort is presented. Domain-specific models are used to describe the IT system and its behavior at a high level of abstraction initially. They are refined into technical representations at lower levels and finall...
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 8th International Middleware Conference 2007, held in Newport Beach, CA, USA, in November 2007. The 22 revised full papers presented were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on component-based middleware, mobile and ubiquitous computing, grid and cluster computing, enhancing communication, resource management, reliability and fault tolerance.