Tuesday, November 30, 2010

Advances in Computing and Communications, Part I: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I (Communications in Computer and Information Science)

Advances in Computing and Communications, Part I: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I (Communications in Computer and Information Science) Review


See more picture


Advances in Computing and Communications, Part I: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part I (Communications in Computer and Information Science) Feature

This volume is the first part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 68 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on ad hoc networks; advanced micro architecture techniques; autonomic and context-aware computing; bioinformatics and bio-computing; cloud, cluster, grid and P2P computing; cognitive radio and cognitive networks; cyber forensics; database and information systems.


Check price now


Rerate Products


Customer Review

Sunday, November 28, 2010

Computing Tools for Modeling, Optimization and Simulation

Computing Tools for Modeling, Optimization and Simulation Review


See more picture


Computing Tools for Modeling, Optimization and Simulation Feature

Computing Tools for Modeling, Optimization and Simulation reflects the need for preserving the marriage between operations research and computing in order to create more efficient and powerful software tools in the years ahead. The 17 papers included in this volume were carefully selected to cover a wide range of topics related to the interface between operations research and computer science. The volume includes the now perennial applications of rnetaheuristics (such as genetic algorithms, scatter search, and tabu search) as well as research on global optimization, knowledge management, software rnaintainability and object-oriented modeling. These topics reflect the complexity and variety of the problems that current and future software tools must be capable of tackling. The OR/CS interface is frequently at the core of successful applications and the development of new methodologies, making the research in this book a relevant reference in the future. The editors' goal for this book has been to increase the interest in the interface of computer science and operations research. Both researchers and practitioners will benefit from this book. The tutorial papers may spark the interest of practitioners for developing and applying new techniques to complex problems. In addition, the book includes papers that explore new angles of well-established methods for problems in the area of nonlinear optimization and mixed integer programming, which seasoned researchers in these fields may find fascinating.


Check price now


Rerate Products


Customer Review

Saturday, November 27, 2010

Pervasive Computing for Quality of Life Enhancement: 5th International Conference On Smart Homes and Health Telematics, ICOST 2007, Nara, Japan, June ... Applications, incl. Internet/Web, and HCI)

Pervasive Computing for Quality of Life Enhancement: 5th International Conference On Smart Homes and Health Telematics, ICOST 2007, Nara, Japan, June ... Applications, incl. Internet/Web, and HCI) Review


See more picture


Pervasive Computing for Quality of Life Enhancement: 5th International Conference On Smart Homes and Health Telematics, ICOST 2007, Nara, Japan, June ... Applications, incl. Internet/Web, and HCI) Feature

This book constitutes the refereed proceedings of the 5th International Conference On Smart Homes and Health Telematics, ICOST 2007, held in Nara, Japan in June 2007. It presents the latest approaches and technical solutions in the area of smart homes, health telematics, and emerging enabling technologies.


Check price now


Rerate Products


Customer Review

Thursday, November 25, 2010

Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings (Communications in Computer and Information Science)

Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings (Communications in Computer and Information Science) Review


See more picture


Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings (Communications in Computer and Information Science) Feature

This book constitutes the refereed proceedings of the 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 2008.

The 18 revised full papers presented together with one introductory paper were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on organisational issues; productivity, effort estimation metrics; standards reference models; documentation knowledge management as well as project issues.


Check price now


Rerate Products


Customer Review

Wednesday, November 24, 2010

Convergence and Hybrid Information Technology: 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings (Communications in Computer and Information Science)

Convergence and Hybrid Information Technology: 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings (Communications in Computer and Information Science) Review


See more picture


Convergence and Hybrid Information Technology: 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings (Communications in Computer and Information Science) Feature

This book constitutes the refereed proceedings of the 5th International Conference on Convergence and Hybrid Information Technology, ICHIT 2011, held in Daejeon, Korea, in September 2011. The 85 revised full papers presented were carefully reviewed and selected from 144 submissions. The papers are organized in topical sections on communications and networking; motion, video, image processing; security systems; cloud, RFID and robotics; industrial application of software systems; hardware and software engineering; healthcare, EEG and e-learning; HCI and data mining; software system and its applications.


Check price now


Rerate Products


Customer Review

Tuesday, November 23, 2010

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Review


See more picture


Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Feature

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization’s mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information.

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls.

Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.


Check price now


Rerate Products


Customer Review

Monday, November 22, 2010

Specification by Example: How Successful Teams Deliver the Right Software

Specification by Example: How Successful Teams Deliver the Right Software Review


See more picture


Specification by Example: How Successful Teams Deliver the Right Software Feature

Summary

Specification by Example is an emerging practice for creating software based on realistic examples, bridging the communication gap between business stakeholders and the dev teams building the software. In this book, author Gojko Adzic distills interviews with successful teams worldwide, sharing how they specify, develop, and deliver software, without defects, in short iterative delivery cycles.

About the Technology

Specification by Example is a collaborative method for specifying requirements and tests. Seven patterns, fully explored in this book, are key to making the method effective. The method has four main benefits: it produces living, reliable documentation; it defines expectations clearly and makes validation efficient; it reduces rework; and, above all, it assures delivery teams and business stakeholders that the software that's built is right for its purpose.

About the Book

This book distills from the experience of leading teams worldwide effective ways to specify, test, and deliver software in short, iterative delivery cycles. Case studies in this book range from small web startups to large financial institutions, working in many processes including XP, Scrum, and Kanban.

Who Should Read this Book

This book is written for developers, testers, analysts, and business people working together to build great software.

What's Inside
  • Common process patterns
  • How to avoid bad practices
  • Fitting SBE in your process
  • 50+ case studies

For additional resources go to specificationbyexample.com.

========================================​======= Table of Contents
    Part 1 Getting started
  1. Key benefits
  2. Key process patterns
  3. Living documentation
  4. Initiating the changes
  5. Part 2 Key process patterns
  6. Deriving scope from goals
  7. Specifying collaboratively
  8. Illustrating using examples
  9. Refining the specification
  10. Automating validation without changing specifications
  11. Validating frequently
  12. Evolving a documentation system
  13. Part 3 Case studies
  14. uSwitch
  15. RainStor
  16. Iowa Student Loan
  17. Sabre Airline Solutions
  18. ePlan Services
  19. Songkick
  20. Concluding thoughts


Check price now


Rerate Products


Customer Review

Sunday, November 21, 2010

Guide to the Software Engineering Body of Knowledge (SWEBOK(R)): 2004 Version

Guide to the Software Engineering Body of Knowledge (SWEBOK(R)): 2004 Version Review


See more picture


Guide to the Software Engineering Body of Knowledge (SWEBOK(R)): 2004 Version Feature

Every profession is based on a body of knowledge and recommended practices, although they are not always defined in a precise manner.

In this Guide, the IEEE Computer Society establishes a baseline for the body of knowledge for the field of software engineering, and the work supports the Society's responsibility to promote the advancement of both theory and practice in this field. It should be noted that the Guide does not purport to define the body of knowledge but rather to serve as a compendium and guide to the knowledge that has been developing and evolving over the past four decades.

A main objective of the SWEBOK(R) Guide -- to provide topical access to the Software Engineering Body of Knowledge -- motivates the fundamental organization of the Guide into 10 knowledge areas (KAs):

  • Software requirements
  • Software design
  • Software construction
  • Software testing
  • Software maintenance
  • Software configuration management
  • Software engineering management
  • Software engineering process
  • Software engineering tools and methods
  • Software quality

Each KA has its own chapter in the Guide.


Check price now


Rerate Products


Customer Review

Friday, November 19, 2010

Passive Regulation: General Systems Design Principles (General Systems Thinking)

Passive Regulation: General Systems Design Principles (General Systems Thinking) Review


See more picture


Passive Regulation: General Systems Design Principles (General Systems Thinking) Feature

Passive Regulation is Volume 2 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" This second books tackles the next question, namely "Why do things stay the same?"

Most people take for granted the stability they see in the world, but for systems thinkers, stability is one of the most fundamental properties, and puzzles, about the systems they struggle to understand and create. Indeed, it's such a fundamental property that it forms the topic of both this volume and its successor, Active Regulation (Volume 3 in the series).

Originally part of the book, On the Design of Stable Systems, in its first, hardcover incarnation, Passive Regulation does not just focus on computer systems, but systems of all kinds—human, natural, and technological.

In a highly readable, original presentation the Weinbergs here explore the subtle art and science of regulating systems, projects, and people in the most efficient and logical manner possible. The authors draw on their respective backgrounds in technology and social science to offer fresh insights and translate them into a language that anyone can understand.

In the course of this presentation, and with the help of dozens of figures, the Weinbergs introduce a host of laws and theorems derived from the best thinking of systems thinkers over the past century. For the most part, the regulation schemes examined in this volume are based on redundancy—the simplest, yet in many ways the most subtle, of all regulation strategies.

Chapters include:
• The Problem of Persistence
• Aggregates
• Birth-Free Aggregates
• Reasoning About Aggregates
• Modeling Differentiated Aggregates
• Programs for Models of Differentiated Aggregates
• Structure and Behavior of Aggregates
• The Structure-Regulation Law
The book also contains an extensive bibliography and an appendix explaining some useful mathematical notation.

In addition to being a reference book for professional and lay people alike, Passive Regulation is suitable as an undergraduate text in the humanities, social, natural, and engineering sciences. It is unique in its approach, highly readable, and offers practical ways of solving problems.


Check price now


Rerate Products


Customer Review

Thursday, November 18, 2010

Information Systems Transformation: Architecture-Driven Modernization Case Studies (The MK/OMG Press)

Information Systems Transformation: Architecture-Driven Modernization Case Studies (The MK/OMG Press) Review


See more picture


Information Systems Transformation: Architecture-Driven Modernization Case Studies (The MK/OMG Press) Feature

Every major enterprise has a significant installed base of existing software systems that reflect the tangled IT architectures that result from decades of patches and failed replacements. Most of these systems were designed to support business architectures that have changed dramatically. At best, these systems hinder agility and competitiveness and, at worst, can bring critical business functions to a halt.

Architecture-Driven Modernization (ADM) restores the value of entrenched systems by capturing and retooling various aspects of existing application environments, allowing old infrastructures to deliver renewed value and align effectively with enterprise strategies and business architectures.

This book provides a practical guide to organizations seeking ways to understand and leverage existing systems as part of their information management strategies. It includes an introduction to ADM disciplines, tools, and standards as well as a series of scenarios outlining how ADM is applied to various initiatives. Drawing upon lessons learned from real modernization projects, it distills the theory and explains principles, processes, and best practices for every industry.



* Acts as a one-stop shopping reference and complete guide for implementing various modernization models in myriad industries and departments.

* Every concept is illustrated with real-life examples from various modernization projects, allowing you to immediately apply tested solutions and see results.

* Authored by the Co-chair of the Object Management Group (OMG) Architecture-Driven Modernization (ADM) Task Force, which sets definitive systems modernization standards for the entire IT industry.

* A web site supports the book with up to date coverage of evolving ADM Specifications, Tutorials, and Whitepapers, allowing you to remain up to date on modernization topics as they develop.


Check price now


Rerate Products


Customer Review