At a time when business demands urge companies to innovate and CIOs face increasing cost pressures, offshore delivery offers ...
Continue reading
This volume is an outcome of the REFT 2005 Workshop on Rigorous Engineering of Fault-Tolerant Systems held in conjunction ...
Continue reading
The book presented at the symposium focused on topics related to these three events and to artificial intelligence and robotics ...
Continue reading
This book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
Continue reading
The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
Continue reading
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. ...
Continue readingThis is the first book to present field studies on the application of subject-oriented business process management (S-BPM). ...
Continue reading
You already know how crucial certification is within the Java community. SCJD Exam with J2SE 5, Second Edition is a valuable ...
Continue reading
This paradigm is based on the following important principles of distributed - plications: Communication: large systems tend ...
Continue reading
This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Continue reading
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...
Continue reading
This book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
Continue reading
Visual notations and languages continue to play a pivotal role ˆ in the design of complex software systems. In many cases ...
Continue reading
This book constitutes the refereed proceedings of the 5th Annual Smart City 360° Summit, held in Braga, Portugal, in December ...
Continue reading
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Continue reading
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Continue reading
This book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
Continue reading
This book introduces advanced concepts in service provisioning and service engineering, including semantic concepts, dynamic ...
Continue reading
Every developer who previously worked with C++ will enjoy the in-depth chapter on important changes in the language from ...
Continue reading
The book is organized in topical sections on enterprise system dependability, software service availability, service availability ...
Continue reading