Trustworthy Global Computing
Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues)
Elsewhere $151.95 $78.55 Save $73.40 (48%)
Free shipping Australia wide
Order Now for Christmas with e-Gift
|Format: ||Paperback, 352 pages|
|Other Information: ||biography|
|Published In: ||Germany, 22 November 2007|
This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC 2006, held in Lucca, Italy, in November 2006.
The 14 revised papers presented together with 2 keynote lectures were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on types to discipline interactions, calculi for distributed systems, flexible modeling, algorithms and systems for global computing, as well as security, anonymity and type safety. The book starts off with activity reviews of four FP6 programmes of the European Union: Aeolus, Mobius, Sensoria, and Catnets.
Table of Contents
FP6 Project Overviews.- Project AEOLUS: An Overview.- MOBIUS: Mobility, Ubiquity, Security.- Sensoria Process Calculi for Service-Oriented Computing.- Global Grids - Making a Case for Self-organization in Large-Scale Overlay Networks.- Keynote Speakers.- Software of the Future Is the Future of Software?.- An Algorithmic Theory of Mobile Agents.- Types to Discipline Interactions.- Spatial-Behavioral Types, Distributed Services, and Resources.- Integration of a Security Type System into a Program Logic.- Calculi for Distributed Systems.- PRISMA: A Mobile Calculus with Parametric Synchronization.- On Bisimulation Proofs for the Analysis of Distributed Abstract Machines.- A Typed Calculus for Querying Distributed XML Documents.- Flexible Modeling.- Verification of Model Transformations: A Case Study with BPEL.- A Fuzzy Approach for Negotiating Quality of Services.- Algorithms and Systems for Global Computing.- Scheduling to Maximize Participation.- On the Limits of Cache-Oblivious Matrix Transposition.- The KOA Remote Voting System: A Summary of Work to Date.- Security, Anonymity and Type Safety.- Security Types for Dynamic Web Data.- Anonymity Protocols as Noisy Channels.- A Framework for Automatically Checking Anonymity with ?CRL.- A Framework for Type Safe Exchange of Mobile Code.
Springer-Verlag Berlin and Heidelberg GmbH & Co. K|
23.4 x 15.6 x 1.8 centimetres (0.54 kg) |