Atjaunināt sīkdatņu piekrišanu

E-grāmata: Concurrency in Dependable Computing

  • Formāts: PDF+DRM
  • Izdošanas datums: 14-Mar-2013
  • Izdevniecība: Springer-Verlag New York Inc.
  • Valoda: eng
  • ISBN-13: 9781475735734
  • Formāts - PDF+DRM
  • Cena: 154,06 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 14-Mar-2013
  • Izdevniecība: Springer-Verlag New York Inc.
  • Valoda: eng
  • ISBN-13: 9781475735734

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Concurrency in Dependable Computing focuses on concurrency related issues in the area of dependable computing. Failures of system components, be hardware units or software modules, can be viewed as undesirable events occurring concurrently with a set of normal system events. Achieving dependability therefore is closely related to, and also benefits from, concurrency theory and formalisms. This beneficial relationship appears to manifest into three strands of work.
Application level structuring of concurrent activities. Concepts such as atomic actions, conversations, exception handling, view synchrony, etc., are useful in structuring concurrent activities so as to facilitate attempts at coping with the effects of component failures.
Replication induced concurrency management. Replication is a widely used technique for achieving reliability. Replica management essentially involves ensuring that replicas perceive concurrent events identically.
Application of concurrency formalisms for dependability assurance. Fault-tolerant algorithms are harder to verify than their fault-free counterparts due to the fact that the impact of component faults at each state need to be considered in addition to valid state transitions. CSP, Petri nets, CCS are useful tools to specify and verify fault-tolerant designs and protocols.
Concurrency in Dependable Computing explores many significant issues in all three strands. To this end, it is composed as a collection of papers written by authors well-known in their respective areas of research. To ensure quality, the papers are reviewed by a panel of at least three experts in the relevant area.

Papildus informācija

Springer Book Archives
I Role of Modelling and Formalisms for Dependable System Design.- 1 Compositional Development in the Event of Interface Difference.- 2 Model-Based Design of Dependability.- 3 TLA Specification of a Mechanism for Concurrent Exception Handling.- 4 Component Based Dependable System Modelling for Easier Verification.- II Application Specific Modelling for Dependable Design and Analysis.- 5 Digging into Concurrency.- 6 Deadlock Free Control in Automated Guided Vehicle Systems.- 7 Quality Analysis of Dependable Information Systems.- III Event Ordering and its Application.- 8 Fault-Tolerant Sequencer.- 9 QoS Analysis of Group Communication Protocols in Wireless Environment.- 10 Semantically Reliable Broadcast.- 11 Exception Handling in Timed Asynchronous Systems.- IV Transactions and Consistent Checkpointing.- 12 A Recovery Model for Cooperative Computations.- 13 Group Transactions.- 14 Checkpointing in Distributed Computing Systems.- V Concurrency in Real-Time Applications.- 15 Concurrency in Dependable Real-Time Objects.