0 e This is the proceedings of the first annual symposium of the Safety-critical Systems Club (The Watershed Media Centre, Bristol, 9-11 February 1993), which provided a forum for exploring and discussing ways of achieving safety in computer systems to be used in safety-critical industrial applications.
One of the most significant developments in computing over the last ten years has been the growth of interest in computer based support for people working together.
Service provisioning in ad hoc networks is challenging given the difficulties of communicating over a wireless channel and the potential heterogeneity and mobility of the devices that form the network.
Classes of socio-technical hazards allow a characterization of the risk in technology innovation and clarify the mechanisms underpinning emergent technological risk.
As computer systems evolve, the volume of data to be processed increases significantly, either as a consequence of the expanding amount of available information, or due to the possibility of performing highly complex operations that were not feasible in the past.
The programme for the Second Safety-critical Systems Symposium was planned to examine the various aspects of technology currently employed in the design of safety-critical systems, as well as to emphasise the importance of safety and risk management in their design and operation.
Practical Usage of ISPF Dialog Manager is a concise and comprehensive source of information for the development of applications using IBM's Dialog Management package.
The Quality Special Interest Group of the British Computer Society presents the edited proceedings of their sixth International Conference on Software Quality Management (SQM'98) held in April 1998 in Amsterdam.
This book developed from an IFIP workshop which brought together methods and architecture researchers in Human Computer Interaction and Software Engineering.
The safe and secure operation ofcomputer systems continues to be the major issue in many applications where there is a threat to people, the environment, investment or goodwill.
Dependability has always been an vital attribute of operational systems, regardless of whether they are highly-specialised (like electricity generating plants) or more general-purpose (like domestic appliances).
SAFECOMP '96 contains papers presented at the 15th International Conference on Computer Safety, Reliability and Security held in Vienna, Austria, 23-25 October 1996.
With the continuing success of Local Area Networks (IANs), there is an increasing demand to extend their capabilities towards higher data rates and wider areas.
Each year the Safety-critical Systems Symposium brings together practitioners and researchers in a quest to inculcate a higher degree of safety engineering into the development and operation of critical software-based systems.
This is a book about multi-threaded programming - it could well be subtitled 'How to write computer programs tllat do lots of different tlrings all at once'.
Dr Peter Milton, Director of Programme Review, Quality Assurance Agency I am grateful to the authors for giving me the opportunity to write this foreword, mainly because it represents the first occasion that the Fund for the Development of Teaching and Learning (FDTL) has led directly to a pUblication such as this.
Implementing Practical DB2 Applications provides a concise source of information for the development and implication of applications using IBM's DB2 relational database package in the MVS environment.
Current Issues in Safety-Critical Systems contains the invited papers presented at the eleventh annual Safety-critical Systems Symposium, held in February 2003.
System design has conventionally been the province of engineers, and the approaches taken to the design of systems have conventionally led to formal specification of the system.
Compiled by an experienced practitioner in the field, this book contains definitions of the major terms used in Reliability Engineering and Software Assessment.
System Development: A Strategic Framework looks at one of the key issues in the design and development of IT systems: the fact that the bulk of system development projects undertaken will fail to meet originally defined objectives.
This book is a translation ofthe accomplishment ofthe French engineer Ammar Attoui, who has set out to bring together the works of computer scientists and automotive engineers.
If you are interested in understanding how the systematic use of task models in the design, development, and usability evaluation of interactive software applications can open new opportunities and possibilities then this book will help you do just that.
Soft Computing has emerged as an important approach towards achieving intelligent computational paradigms where key elements are learning from experience in the presence of uncertainties, fuzzy belief functioos, and *evolutioo of the computing strategies of the learning agent itself.
Components of System Safety contains the invited papers presented at the tenth annual Safety-critical Systems Symposium, held in Southampton, February 2002.
Information Spaces: The Architecture of Cyberspace is aimed at students taking information management as a minor in their course as well as those who manage document collections but who are not professional librarians.
This is one of the shorter books in the 21 volume Practitioner Book Series, but this is entirely appropriate for a text on the ubiquitous topic of Quality.
If you have picked up this book and are browsing the Preface, you may well be asking yourself"e;What makes this book different from the large number I can find on amazon.
The two-volume set LNCS 14634 and 14635 constitutes the refereed proceedings of the 27th European Conference on Applications of Evolutionary Computation, EvoApplications 2024, held as part of EvoStar 2024, in Aberystwyth, UK, April 3-5, 2024, and co-located with the EvoStar events, EvoCOP, EvoMUSART, and EuroGP.
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13-15, 2023.
This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th International Conference on Computational Science and Its Applications, ICCSA 2024, held at Hanoi, Vietnam, during July 1-4, 2024.
The five-volume set CCIS 1832-1836 contains the extended abstracts of the posters presented during the 25th International Conference on Human-Computer Interaction, HCII 2023, which was held as a hybrid event in Copenhagen, Denmark, in July 2023.
This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th International Conference on Computational Science and Its Applications, ICCSA 2024, held at Hanoi, Vietnam, during July 1-4, 2024.
This six-volume set, LNAI 15387-15392, constitutes the refereed proceedings of the 20th International Conference on Advanced Data Mining and Applications, ADMA 2024, held in Sydney, New South Wales, Australia, during December 3-5, 2024.
The three-volume set LNCS 15338, 15339 and 15340 constitutes the refereed proceedings from the 41st Computer Graphics International Conference, CGI 2024, held during July 1-5, 2024, in Geneva, Switzerland.