Atjaunināt sīkdatņu piekrišanu

E-grāmata: Autonomic and Trusted Computing: 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Programming and Software Engineering 6407
  • Izdošanas datums: 31-Oct-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642165764
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Programming and Software Engineering 6407
  • Izdošanas datums: 31-Oct-2010
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642165764

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systemsas well as servicesavailable, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), heldin Xian, China, October 2629, 2010.
Autonomic and Organic Computing
Self-organizing Computer Vision for Robust Object Tracking in Smart Cameras
1(16)
Stefan Wildermann
Andreas Oetken
Jurgen Teich
Zoran Salcic
A Formal Framework for Compositional Verification of Organic Computing Systems
17(15)
Florian Nafz
Hella Seebach
Jan-Philipp Steghofer
Simon Baumler
Wolfgang Reif
On-Line Adaptive Algorithms in Autonomic Restart Control
32(15)
Hiroyuki Okamura
Tadashi Dohi
Kishor S. Trivedi
Designing Self-healing in Automotive Systems
47(15)
Hella Seebach
Florian Nafz
Jorg Holtmann
Jan Meyer
Matthias Tichy
Wolfgang Reif
Wilhelm Schafer
Trustworthy Organic Computing Systems: Challenges and Perspectives
62(15)
Jan-Philipp Steghofer
Rolf Kiefhaber
Karin Leichtenstern
Yvonne Bernard
Lukas Klejnowski
Wolfgang Reif
Theo Ungerer
Elisabeth Andre
Jorg Hahner
Christian Muller-Schloer
AC/OC Network and Protocol
Adaptive Control of Sensor Networks
77(15)
Sven Tomforde
Ioannis Zgeras
Jorg Hahner
Christian Muller-Schloer
Design of Location-Based Hierarchical Overlay Network Supporting P2PSIP Conferencing Service
92(15)
Hui-Kai Su
Chien-Min Wu
Wang-Hsai Yang
Trust Models and Application
Effects of Displaying Trust Information on Mobile Application Usage
107(15)
Zheng Yan
Conghui Liu
Valtteri Niemi
Guoliang Yu
Context Based Trust Normalization in Service-Oriented Environments
122(17)
Lei Li
Yan Wang
A Framework for Trust Enabled Software Asset Retrieval
139(15)
YanZhen Zou
SiBo Cai
Meng Li
Lijie Wang
Bing Xie
Opportunistic Trust Based P2P Services Framework for Disconnected MANETs
154(14)
Basit Qureshi
Geyong Min
Demetres Kouvatsos
A Risk-Aware Resource Service Decision Strategy for Global Computing
168(14)
Wei Du
Guohua Cui
Wei Liu
Trustworthy Computing
Message Race Detection for Web Services by an SMT-Based Analysis
182(13)
Mohamed Elwakil
Zijiang Yang
Liqiang Wang
Qichang Chen
A User-Oriented Approach to Assessing Web Service Trustworthiness
195(13)
Weinan Zhao
Hailong Sun
Zicheng Huang
Xudong Liu
Xitong Kang
Improving the Trustworthiness of Service QoS Information in Service-Based Systems
208(11)
Stephen S. Yau
Jing Huang
Yin Yin
Using ELECTRE TRI Outranking Method to Evaluate Trustworthy Software
219(9)
Gang Lu
Huaimin Wang
Xiaoguang Mao
The Testing Method for Interface Customized Component
228(14)
Ying Jiang
Ying-Na Li
Hai-Wang Zhang
Trust-Related Security
A New Monitor Model for Enhancing Trust-Based Systems
242(13)
Lang Jia
Paddy Nixon
Design and Analysis of "Flexible" k-out-of-n Signatures
255(13)
Raylin Tso
Xun Yi
Tadahiko Ito
Takeshi Okamoto
Eiji Okamoto
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints
268(15)
Stefano Bistarelli
Fabio Martinelli
Francesco Santini
Invited Session
Towards Autonomic Mode Control of a Scalable Intrusion Tolerant Architecture
283(15)
Tadashi Dohi
Toshikazu Uemura
Agent-Augmented Co-Space: Toward Merging of Real World and Cyberspace
298(15)
Ah-Hwee Tan
Yilin Kang
On Alleviating Reader Collisions towards High Efficient RFID Systems
313(14)
Ching-Hsien Hsu
Chia-Hao Yu
Author Index 327