×







We sell 100% Genuine & New Books only!

Computer Systems at Meripustak

Computer Systems by HERBERT, SPRINGER

Books from same Author: HERBERT

Books from same Publisher: SPRINGER

Related Category: Author List / Publisher List


  • Price: ₹ 7543.00/- [ 13.00% off ]

    Seller Price: ₹ 6562.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)HERBERT
    PublisherSPRINGER
    ISBN9780387201702
    Pages338
    BindingHardbound
    LanguageEnglish
    Publish YearApril 2004

    Description

    SPRINGER Computer Systems by HERBERT

    An invited collection of peer-reviewed papers surveying key areas of Roger Needham's distinguished research career at Cambridge University and Microsoft Research.From operating systems to distributed computing, many of the world's leading researchers provide insight into the latest concepts and theoretical insights--many of which are based upon Needham's pioneering research work.A critical collection of edited-survey research papers spanning the entire range of Roger Needham's distinguished scientific career, from operating systems to distributed computing and security. Many of the world's leading researchers survey their topics' latest developments and acknowledge the theoretical foundations of Needham's work.Introduction to book written by Rick Rashid, Director of Microsoft Research Worldwide. ContentsPreface Roger Needham: 50 + 5 Meeting Programme Contributors Introduction: Roger NeedhamRick Rashid 1 On Access Control, Data Integration, and Their LanguagesMartin Abadi 2 Protocol Analysis, Composability and ComputationRoss Anderson, Michael Bond 3 Access Control in Distributed SystemsJean Bacon, Ken Moody 4 Implementing Condition Variables with SemaphoresAndrew D. Birrell 5 Clumps, Clusters and ClassificationChristopher M. Bishop 6 How to Implement Unnecessary MutexesMike Burrows 7 Bioware LanguagesLuca Cardelli 8 The Economics of Open SystemsDavid D. Clark 9 From Universe to Global InternetJon Crowcroft 10 Needham-Schroeder Goes to CourtDorothy E. Denning 11 The Design of Reliable Operating SystemsPeter Denning 12 An Historical Connection between Time-Sharing and Virtual CircuitsSandy Fraser 13 On Cross-Platform SecurityLi Gong 14 Distributed Computing EconomicsJim Gray 15 The Titan InfluenceDavid Hartley 16 Middleware? Muddleware?Andrew Herbert 17 Grand Challenges for Computing ResearchTony Hoare 18 Sentient ComputingAndy Hopper 19 Cyber Security in Open SystemsAnita Jones 20 Software Components: Only the Giants SurviveButler W. Lampson 21 Security Protocols: Who Knows What Exactly?Peter Landrock 22 Volume Rendering by Ray-Casting in Shear-Image OrderHugh C. Lauer, Yin Wu, Vishal Bhatia, Larry Seiler 23 A Conceptual Authorization Model for Web ServicesPaul J. Leach, Chris Kaler, Blair Dillaway, Praerit Garg, Brian LaMacchia, Butler Lampson, John Manferdelli, Rick Rashid, John Shewchuk, Dan Simon, Richard Ward 24 The Trouble with StandardsE. Stewart Lee 25 Novelty in the Nemesis Operating SystemIan Leslie 26 A Technology Transfer RetrospectiveRoy Levin 27 An Optical LANDerek McAuley 28 What's in a Name?Robin Milner 29 The Cryptographic Role of the Cleaning LadyBob Morris 30 Real Time in a Real Operating SystemSape J. Mullender, Pierre G. Jansen 31 Zen and the Art of Research ManagementJohn Naughton, Robert W. Taylor 32 The Descent of BANLawrence C. Paulson 33 Brief EncountersBrian Randell 34 Retrieval System Models: What's New?Stephen Robertson, Karen Sparck Jones 35 Slammer: An Urgent Wake-Up CallJerome H. Saltzer 36 Caching Trust Rather Than ContentM. Satyanarayanan 37 Least Privilege and MoreFred B. Schneider 38 Using Sharing to Simplify System ManagementMichael D. Schroeder 39 An RSA-Related Number-Theoretic SurpriseGustavus J. Simmons 40 Application-Private NetworksJonathan M. Smith 41 Using the CORAL System to Discover Attacks on Security ProtocolsGraham Steel, Alan Bundy, Ewen Denney 42 On the Role of Binding and Rate Adaptation in Packet NetworksDavid Tennenhouse 43 Technologies for Portable ComputingChuck Thacker 44 Multiple Alternative VotingDavid Wheeler 45 The Semiotics of UmbrellasJohn Wilkes 46 Computers for Specialized Application AreasMaurice Wilkes 47 Computer Security?Roger Needham Roger Needham: PublicationsKaren Sparck Jones



    Book Successfully Added To Your Cart