The International Workshop on "Autonomous Systems - Self-Organization, Management, and Control " is the eighth in a successful ...
Continue reading
This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue reading
This book constitutes the refereed proceedings of the 15th International Conference on High-Performance Computing, HiPC 2008, ...
Continue reading
Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Continue reading
This book presents the latest advances in methodology and techniques of performance modeling and engineering, ranging from ...
Continue reading
Presents various concepts and applications related to risk-conscious operations management. It also provides an overview ...
Continue reading
The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
Continue reading
This book summarizes the research done and results obtained in the second funding phase of the Priority Program 1648 "Software ...
Continue reading
The Common Component Modelling Example makes it possible to compare different approaches and to validate existing models. ...
Continue reading