Proceedings of the Fifth USENIX Conference on Object-Oriented Technologies and Systems (COOTS '99)
Author :
Publisher :
Page : 252 pages
File Size : 24,54 MB
Release : 1999
Category : Computer software
ISBN :
Author :
Publisher :
Page : 252 pages
File Size : 24,54 MB
Release : 1999
Category : Computer software
ISBN :
Author : USENIX Conference on Object-Oriented Technologies and Systems (COOTS)
Publisher :
Page : 212 pages
File Size : 45,79 MB
Release : 2001
Category : Computer software
ISBN :
Author : British Library. Document Supply Centre
Publisher :
Page : 836 pages
File Size : 13,61 MB
Release : 2000
Category : Conference proceedings
ISBN :
Author : Boris Magnusson
Publisher : Springer Science & Business Media
Page : 648 pages
File Size : 48,75 MB
Release : 2002-06-03
Category : Computers
ISBN : 3540437592
This book constitutes the refereed proceedings of the 16th European Conference on Object-Oriented Programming, ECOOP 2002, held in Malaga, Spain, in June 2002. The 24 revised full papers presented together with one full invited paper were carefully reviewed and selected from 96 submissions. The book offers topical sections on aspect-oriented software development, Java virtual machines, distributed systems, patterns and architectures, languages, optimization, theory and formal techniques, and miscellaneous.
Author : Ryoichi Sasaki
Publisher : Springer
Page : 604 pages
File Size : 47,4 MB
Release : 2010-06-03
Category : Computers
ISBN : 0387256601
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.
Author : Joseph Sventek
Publisher : Springer
Page : 447 pages
File Size : 13,14 MB
Release : 2003-06-29
Category : Computers
ISBN : 3540455590
Middleware is everywhere. Ever since the advent of sockets and other virtu- circuit abstractions, researchers have been looking for ways to incorporate high- value concepts into distributed systems platforms. Most distributed applications, especially Internet applications, are now programmed using such middleware platforms. Prior to 1998, there were several major conferences and workshops at which research into middleware was reported, including ICODP (International C- ference on Open Distributed Processing), ICDP (International Conference on Distributed Platforms) and SDNE (Services in Distributed and Networked - vironments). Middleware’98was a synthesis of these three conferences. Middleware 2000 continued the excellent tradition of Middleware’98. It p- vided a single venue for reporting state-of-the-art results in the provision of distributed systems platforms. The focus of Middleware 2000 was the design, implementation, deployment, and evaluation of distributed systems platforms and architectures for future networked environments. Among the 70 initial submissions to Middleware 2000, 21 papers were - lected for inclusion in the technical program of the conference. Every paper was reviewed by four members of the program committee. The papers were judged - cording to their originality, presentation quality, and relevance to the conference topics. The accepted papers cover various subjects such as caching, re?ection, quality of service, and transactions.
Author : Greg Butler
Publisher : Springer
Page : 210 pages
File Size : 17,82 MB
Release : 2003-06-30
Category : Computers
ISBN : 3540448152
This book constitutes the thoroughly refereed post-proceedings of the Second International Symposium on Generative and Component-Based Software Engineering, GCSE 2000, held in Erfurt, Germany in October 2000.The twelve revised full papers presented with two invited keynote papers were carefully reviewed and selected from 29 submissions. The book offers topical sections on aspects and patterns, models and paradigms, components and architectures, and Mixin-based composition and metaprogramming.
Author : Kwangkeun Yi
Publisher : Springer Science & Business Media
Page : 445 pages
File Size : 41,54 MB
Release : 2005-10-21
Category : Computers
ISBN : 3540297359
This book constitutes the refereed proceedings of the Third Asian Symposium on Programming Languages and Systems, APLAS 2005, held in Tsukuba, Japan in November 2005. The 24 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 78 submissions. Among the topics covered are semantics, type theory, program transformation, static analysis, verification, programming calculi, functional programming languages, language based security, real-time systems, embedded systems, formal systems design, Java objects, program analysis and optimization.
Author : Rachid Guerraoui
Publisher : Springer Science & Business Media
Page : 408 pages
File Size : 35,36 MB
Release : 2007-11-22
Category : Computers
ISBN : 3540455183
This book constitutes the refereed proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms, Middleware 2001, held in Heidelberg, Germany, in November 2001. The 20 revised full papers presented were carefully reviewed and selected from a total of 116 submissions. The papers are organized in topical sections on Java, mobility, distributed abstractions, reliability, home and office, scalability, and quality of service.
Author : Hans-W. Gellersen
Publisher : Springer
Page : 403 pages
File Size : 17,31 MB
Release : 2003-06-29
Category : Computers
ISBN : 3540481575
Truly personal handheld and wearable technologies should be small and unobtrusive and allow access to information and computing most of the time and in most circumstance. Complimentary, environment-based technologies make artifacts of our surrounding world computationally accessible and facilitate use of everyday environments as a ubiquitous computing interface. The International Symposium on Handheld and Ubiquitous Computing, held for the first time in September 1999, was initiated to investigate links and synergies in these developments, and to relate advances in personal technologies to those in environment-based technologies. The HUC 99 Symposium was organised by the University of Karlsruhe, in particular by the Telecooperation Office (TecO) of the Institute for Telematics, in close collaboration with ZKM Karlsruhe, which generously hosted the event in its truly inspiring Center for Arts and Media Technology. The symposium was supported by the Association of Computing Machinery (ACM) and the German Computer Society (Gesellschaft f r Informatik, GI) and held in cooperation with a number of special interest groups of these scientific societies. HUC 99 attracted a large number of paper submissions, from which the international programme committee selected 23 high-quality contributions for presentation at the symposium and for inclusion in these proceedings. In addition, posters were solicited to provide an outlet for novel ideas and late-breaking results; selected posters are also included with these proceedings. The technical programme was further complemented by four invited keynote addresses, and two panel sessions.