Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
Real property --- Immobilienbewertung. --- Bilanzielle Bewertung. --- USA. --- Welt. --- Real property. --- Cadastral surveys --- Catastral surveys --- Freehold --- Limitations (Law) --- Property, Real --- Real estate --- Real estate law --- Realty --- Property --- Rent --- Valuation --- Valuation. --- Law and legislation --- United States. --- Economic relations. Trade --- Business, Economy and Management --- Business Management --- Economics --- General and Others
Choose an application
Autonomic computing --- Computer security --- Computer networks --- Informatique autonome --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Software engineering. --- Operating systems (Computers). --- Data encryption (Computer science). --- Computers. --- Computer Science. --- Theory of Computation. --- Operating Systems. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Operating systems --- Distributed processing --- Information theory. --- Cryptology. --- Communication theory --- Communication --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Trusted computing
Choose an application
Autonomic computing --- Computer security --- Computer networks --- Informatique autonome --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Computer Science. --- Theory of Computation. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Distributed processing --- Information theory. --- Cryptology. --- Communication theory --- Communication --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems––as well as services––available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi’an, China, October 26–29, 2010.
Autonomic computing --- Engineering & Applied Sciences --- Computer Science --- Computer security --- Computer networks --- Security measures --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Informatics --- Science --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 5th International Conference on Autonomic and Trusted Computing, ATC 2008, held in Oslo, Norway, in June 2008, co-located with UIC 2008, the 5th International Conference on Ubiquitous Intelligence and Computing. The 25 revised full papers presented together with 26 special session papers and 1 keynote talk were carefully reviewed and selected from 75 submissions. The regular papers are organized in topical sections on intrusion detection, trust, trusted systems and crypto, autonomic computing, organic computing, knowledge and patterns, and pervasive systems. The special session papers cover issues such as organic computing, trust, trust and dependable systems, routing and reliable systems, sensor networks, VoIP, and watermarking. .
Autonomic computing --- Computer security --- Computer networks --- Informatique autonome --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses. --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
During the early Ottoman period (1300-1453), scholars in the empire carefully kept their distance from the ruling class. This changed with the capture of Constantinople. From 1453 onwards, the Ottoman government co-opted large groups of scholars, usually over a thousand at a time, and employed them in a hierarchical bureaucracy to fulfill educational, legal and administrative tasks. Abdurrahman Atçıl explores the factors that brought about this gradual transformation of scholars into scholar-bureaucrats, including the deliberate legal, bureaucratic and architectural actions of the Ottoman sultans and their representatives, scholars' own participation in shaping the rules governing their status and careers, and domestic and international events beyond the control of either group.
Geschiedenis van Zuid-Europa --- anno 1300-1399 --- anno 1400-1499 --- Turkije --- History of Southern Europe --- Turkey --- Sultans --- Scholars --- Kings and rulers --- Learning and scholarship --- Bureaucracy --- Politics and government. --- Interorganizational relations --- Political science --- Public administration --- Organizational sociology --- Erudition --- Scholarship --- Civilization --- Intellectual life --- Education --- Research --- Czars (Kings and rulers) --- Kings and rulers, Primitive --- Monarchs --- Royalty --- Rulers --- Sovereigns --- Tsars --- Tzars --- Heads of state --- Queens --- Persons --- History --- Ottoman Empire --- Ottoman Empire, 1288-1918
Choose an application
This book constitutes the refereed proceedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers presented together with one invited paper and one keynote talk were carefully reviewed and selected from 52 submissions. The regular papers are organized in topical sections on organic and autonomic computing, trusted computing, wireless sensor networks, and trust.
Autonomic computing --- Computer security --- Computer networks --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011. The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
Engineering & Applied Sciences --- Computer Science --- Autonomic computing --- Computer security --- Computer networks --- Security measures --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Computer Communication Networks. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Distributed processing --- Information Systems. --- Cryptology. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Choose an application
Listing 1 - 10 of 14 | << page >> |
Sort by
|