|
|
|
|
LEADER |
03558nam a22005895i 4500 |
001 |
978-3-642-00945-7 |
003 |
DE-He213 |
005 |
20170125021847.0 |
007 |
cr nn 008mamaa |
008 |
100301s2009 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642009457
|9 978-3-642-00945-7
|
024 |
7 |
|
|a 10.1007/978-3-642-00945-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Trustworthy Global Computing
|h [electronic resource] :
|b 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers /
|c edited by Christos Kaklamanis, Flemming Nielson.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2009.
|
300 |
|
|
|a IX, 217 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5474
|
505 |
0 |
|
|a Contract-Driven Implementation of Choreographies -- Model Checking Usage Policies -- Bounds on the Leakage of the Input’s Distribution in Information-Hiding Protocols -- Combining Timed Coordination Primitives and Probabilistic Tuple Spaces -- Provably Correct Implementations of Services -- A Process Calculus Analysis of Compensations -- Structured Communications with Concurrent Constraints -- Type Systems for Bigraphs -- On the Relative Expressive Power of Ambient-Based Calculi -- Connectivity in Multi-interface Networks -- Optimal Routing and Call Scheduling in Wireless Mesh Networks with Localized Informations -- Trust Management and Trust Negotiation in an Extension of SQL -- Dynamic Recovering of Long Running Transactions.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Symposium on Trustworthy Global Computing, TGC 2008 held in Barcelona, Spain, in November 2008. The 12 revised papers presented together with one invited paper were carefully selected from 26 submissions during two rounds of reviewing and improvement. The TGC 2008 symposium papers focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior and properties in models of computation that incorporate code and data mobility over distributed networks with highly dynamic topologies and heterogeneous devices.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Programming languages (Electronic computers).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer logic.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a Programming Languages, Compilers, Interpreters.
|
650 |
2 |
4 |
|a Logics and Meanings of Programs.
|
700 |
1 |
|
|a Kaklamanis, Christos.
|e editor.
|
700 |
1 |
|
|a Nielson, Flemming.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642009440
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 5474
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-00945-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|