Cargando…

Autonomic and Trusted Computing 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings /

This book constitutes the refereed procedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: González Nieto, Juan (Editor ), Wang, Guojun (Editor ), Reif, Wolfgang (Editor ), Indulska, Jadwiga (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Programming and Software Engineering, 5586
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-02704-8
003 DE-He213
005 20220311224856.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642027048  |9 978-3-642-02704-8 
024 7 |a 10.1007/978-3-642-02704-8  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Autonomic and Trusted Computing  |h [electronic resource] :  |b 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings /  |c edited by Juan González Nieto, Guojun Wang, Wolfgang Reif, Jadwiga Indulska. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XII, 269 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Programming and Software Engineering,  |x 2945-9168 ;  |v 5586 
505 0 |a Keynote Speech -- Design for Trust in Ambient and Ubiquitous Computing -- Organic and Autonomic Computing -- Towards an Organic Network Control System -- A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems -- Towards Self-organization in Automotive Embedded Systems -- Analyzing the Behavior of an Artificial Hormone System for Task Allocation -- A Software Test Cases Automated Generation Algorithm Based on Immune Principles -- Management without (Detailed) Models -- Formal Development of Self-organising Systems -- Using Reinforcement Learning for Multi-policy Optimization in Decentralized Autonomic Systems - An Experimental Evaluation -- Trusted Computing -- SAConf: Semantic Attestation of Software Configurations -- ALOPA: Authorization Logic for Property Attestation in Trusted Platforms -- Wireless Sensor Networks -- Employed BPN to Multi-sensors Data Fusion for Environment Monitoring Services -- Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks -- Trust -- A Methodology towards Usable Trust Management -- Formalizing Trust Based on Usage Behaviours for Mobile Applications -- Toward Trustworthy Semantic Web Service Discovery and Selection -- Fuzzy Regression Based Trust Prediction in Service-Oriented Applications -- Theories of Trust for Communication Protocols -- Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. 
520 |a This book constitutes the refereed procedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers presented together with one invited paper and one keynote talk were carefully reviewed and selected from 52 submissions. The regular papers are organized in topical sections on organic and autonomic computing, trusted computing, wireless sensor networks, and trust. 
650 0 |a Data protection. 
650 0 |a Software engineering. 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Application software. 
650 0 |a Electronic data processing-Management. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Software Engineering. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Cryptology. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a IT Operations. 
700 1 |a González Nieto, Juan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wang, Guojun.  |e editor.  |0 (orcid)0000-0001-9875-4182  |1 https://orcid.org/0000-0001-9875-4182  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Reif, Wolfgang.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Indulska, Jadwiga.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642027055 
776 0 8 |i Printed edition:  |z 9783642027031 
830 0 |a Programming and Software Engineering,  |x 2945-9168 ;  |v 5586 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-02704-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)