At a time when business demands urge companies to innovate and CIOs face increasing cost pressures, offshore delivery offers ...
Continue readingThis volume is an outcome of the REFT 2005 Workshop on Rigorous Engineering of Fault-Tolerant Systems held in conjunction ...
Continue readingThe book presented at the symposium focused on topics related to these three events and to artificial intelligence and robotics ...
Continue readingThis book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
Continue readingThe subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
Continue readingThis volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. ...
Continue readingThis is the first book to present field studies on the application of subject-oriented business process management (S-BPM). ...
Continue readingYou already know how crucial certification is within the Java community. SCJD Exam with J2SE 5, Second Edition is a valuable ...
Continue readingThis paradigm is based on the following important principles of distributed - plications: Communication: large systems tend ...
Continue readingThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Continue readingSQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...
Continue readingThis book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
Continue readingVisual notations and languages continue to play a pivotal role ˆ in the design of complex software systems. In many cases ...
Continue readingThis book constitutes the refereed proceedings of the 5th Annual Smart City 360° Summit, held in Braga, Portugal, in December ...
Continue readingThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Continue readingThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Continue readingThis book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
Continue readingThis book introduces advanced concepts in service provisioning and service engineering, including semantic concepts, dynamic ...
Continue readingEvery developer who previously worked with C++ will enjoy the in-depth chapter on important changes in the language from ...
Continue readingThe book is organized in topical sections on enterprise system dependability, software service availability, service availability ...
Continue reading