Software Engineering Books

758 products


  • Springer Software Engineering and Formal Methods. SEFM

    Out of stock

    Book SynopsisReacTS 2024ReacTS 2024 Organizers’s Message.- Behavioural Equivalences over Reconfigurable Systems.- Graph Games and Dynamic Logics.- Arbitrary Radical Upgrades.- Binders for switch graphs specification.- Higher-order arrows for Path-Dependent Many-Valued Systems.- Towards resolving distributed beliefs.- A new fuzzy approach to transition and bisimulation systems.- Pivotal Rules Consequence in Action Model Logic.- Paraconsistent Reactive Graphs.- Reconfiguring staggered quantum walks with ZX?.- Many-logic modal structures based on the lattice L6: a first look.- CIFMA 2024CIFMA 2024 Organizers’s Message.- On group secrets and the metacommunicative aspects of revealing a true secret.- Explicit Legg-Hutter intelligence calculations which suggest non-Archimedean intelligence.- Cognitive Aspects in the Formal Modelling of Multi-party Human-computer Interaction.- On the Morphic Problem in Artificial Neural Networks.- Time Factor in Neural Learning Processes.- How Does Culture Shape the Perception of Social Robots?.- Executive Cognitive Control of Free Choices.- Towards a Readability Criterion for Humans and Machines.- From birth to loss of representations in artificial neural networks.

    Out of stock

    £58.49

  • Coordination Models and Languages

    Springer Coordination Models and Languages

    Out of stock

    Book Synopsis.- Mechanized Type Soundness for Substructural Types using Iris (Invited Tutorial)..- Towards Automated Analysis of Emerging Behaviour: Preliminary Insights and Research Directions (Invited Talk)..- Formal Foundations for Reowolf: Multi-Party Sessions via Synchronous Protocol Programming..- Formalizing Errors in CCS with 3-Valued Logic..- Verified Parameterized Choreographies..- A Constraint Opinion Model..- MIMOSA: A Language for Asynchronous Implementation of Embedded Systems Software..- Declarative Deployment Planning for Green Pulverised Collective Computational Systems..- Decidability Problems for Micro-Stipula..- Behavioural, Functional, and Non-Functional Contracts for Dynamic Selection of Services..- Dialects for the CoAP IoT Messaging Protocol..- DACEO: Declarative Asynchronous Choreographies with Datadependent Event Ordering..- RebeCaos..- A Demonstrator Toolchain for Self-organizing Robot Teams.

    Out of stock

    £53.99

  • Software Source Code: Statistical Modeling

    De Gruyter Software Source Code: Statistical Modeling

    7 in stock

    Book Synopsis

    7 in stock

    £51.75

  • de Gruyter Softwareentwicklung

    1 in stock

    Book Synopsis

    1 in stock

    £59.46

  • de Gruyter Programmsysteme

    Out of stock

    Book Synopsis

    Out of stock

    £134.09

  • de Gruyter SoftwareEngineering

    Out of stock

    Book Synopsis

    Out of stock

    £134.09

  • de Gruyter SoftwareEngineering

    Out of stock

    Book Synopsis

    Out of stock

    £134.09

  • de Gruyter Wissensbasierte Programmkonstruktion I

    Out of stock

    Book Synopsis

    Out of stock

    £134.09

  • Agile!: The Good, the Hype and the Ugly

    Springer International Publishing AG Agile!: The Good, the Hype and the Ugly

    15 in stock

    Book SynopsisAre you attracted by the promises of agile methods but put off by the fanaticism of many agile texts? Would you like to know which agile techniques work, which ones do not matter much, and which ones will harm your projects? Then you need Agile!: the first exhaustive, objective review of agile principles, techniques and tools.Agile methods are one of the most important developments in software over the past decades, but also a surprising mix of the best and the worst. Until now every project and developer had to sort out the good ideas from the bad by themselves. This book spares you the pain. It offers both a thorough descriptive presentation of agile techniques and a perceptive analysis of their benefits and limitations.Agile! serves first as a primer on agile development: one chapter each introduces agile principles, roles, managerial practices, technical practices and artifacts. A separate chapter analyzes the four major agile methods: Extreme Programming, Lean Software, Scrum and Crystal.The accompanying critical analysis explains what you should retain and discard from agile ideas. It is based on Meyer’s thorough understanding of software engineering, and his extensive personal experience of programming and project management. He highlights the limitations of agile methods as well as their truly brilliant contributions — even those to which their own authors do not do full justice.Three important chapters precede the core discussion of agile ideas: an overview, serving as a concentrate of the entire book; a dissection of the intellectual devices used by agile authors; and a review of classical software engineering techniques, such as requirements analysis and lifecycle models, which agile methods criticize.The final chapters describe the precautions that a company should take during a transition to agile development and present an overall assessment of agile ideas.This is the first book to discuss agile methods, beyond the brouhaha, in the general context of modern software engineering. It is a key resource for projects that want to combine the best of established results and agile innovations. Trade Review“This is probably the first serious book ever written about Agile … . Bertrand Meyer is not a signatory of the Agile Manifesto, resulting in a book free of hype or marketing propaganda. … It consists of a short … enumeration of ‘pros and cons’ of various methodologies, with discussions about their applicability and suitability for certain projects.” (Adrian Kosmaczewski, De Programmatica Ipsum, deprogrammaticaipsum.com, January 6, 2021)“This book was written to be an independent, impartial and objective study of the various agile methods (scrum, xp, lean, crystal) viewed against the knowledge-base of software engineering methods and principles. … This book, in my view, should be essential reading for any software manager, looking to understand agile methods before diving head-first into a vanilla, textbook-implementations.” (Outlet!, khanmjk-outlet.blogspot.de, November, 2015)“The purpose of this excellent book is to ‘enable readers to benefit from the good ideas in agile methods and stay away from the bad ones.’ … The overall presentation is elegant, clear, and understandable … . It can be used both by novices and by experts … .” (H. I. Kilov, Computing Reviews, September, 2014) Table of Contents

    15 in stock

    £47.49

  • UML @ Classroom: An Introduction to

    Springer International Publishing AG UML @ Classroom: An Introduction to

    1 in stock

    Book SynopsisThis textbook mainly addresses beginners and readers with a basic knowledge of object-oriented programming languages like Java or C#, but with little or no modeling or software engineering experience – thus reflecting the majority of students in introductory courses at universities. Using UML, it introduces basic modeling concepts in a highly precise manner, while refraining from the interpretation of rare special cases. After a brief explanation of why modeling is an indispensable part of software development, the authors introduce the individual diagram types of UML (the class and object diagram, the sequence diagram, the state machine diagram, the activity diagram, and the use case diagram), as well as their interrelationships, in a step-by-step manner. The topics covered include not only the syntax and the semantics of the individual language elements, but also pragmatic aspects, i.e., how to use them wisely at various stages in the software development process. To this end, the work is complemented with examples that were carefully selected for their educational and illustrative value.Overall, the book provides a solid foundation and deeper understanding of the most important object-oriented modeling concepts and their application in software development. An additional website offers a complete set of slides to aid in teaching the contents of the book, exercises and further e-learning material. Table of Contents1 Introduction.- 2 A Short Tour of UML.- 3 The Use Case Diagram.- 4 The Class Diagram.- 5 The State Machine Diagram.- 6 The Sequence Diagram.- 7 The Activity Diagram.- 8 All Together Now.- 9 Further Topics.

    1 in stock

    £45.94

  • Finite Difference Computing with Exponential

    Springer International Publishing AG Finite Difference Computing with Exponential

    Out of stock

    Book SynopsisThis text provides a very simple, initial introduction to the complete scientific computing pipeline: models, discretization, algorithms, programming, verification, and visualization. The pedagogical strategy is to use one case study – an ordinary differential equation describing exponential decay processes – to illustrate fundamental concepts in mathematics and computer science. The book is easy to read and only requires a command of one-variable calculus and some very basic knowledge about computer programming. Contrary to similar texts on numerical methods and programming, this text has a much stronger focus on implementation and teaches testing and software engineering in particular. Trade Review“This text provides an overview of the basics of scientific computing. … the author provides an excellent introduction to the field of scientific computing via a consideration of physically relevant models. … This text is an excellent tool for teaching and ideal for readers who would like to enter the field, or reinforce prior knowledge.” (Charis Harley, zbMATH 1356.65188, 2017)Table of ContentsPreface.- Algorithms and implementations.- Analysis.- Generalizations.- Models.- Scientific Software Engineering.- References.- Index.

    Out of stock

    £35.99

  • Software Engineering and Formal Methods: 14th

    Springer International Publishing AG Software Engineering and Formal Methods: 14th

    Out of stock

    Book SynopsisThis book constitutes the proceedings of the 14th International Conference on Software Engineering and Formal Methods, SEFM 2016, held as part of STAF 2016, in Vienna, Austria, in July 2016. The 20 full and 5 short papers presented in this volume were carefully reviewed and selected from 88 submissions. They were organized in topical sections named: concurrency and non-interference; program analysis; model checking; verification; interaction and adaptation; and development methods.Table of ContentsInvited Papers.- Abstractions, Semantic Models and Analysis Tools for Concurrent Systems: Progress and Open Problems.- Satisfiability Checking: Theory and Applications.- Concurrency and Non-Interference.- Automatic Derivation of Platform Noninterference Properties.- Linearizability and Causality.- Refinement-based verification of Communicating Unstructured Code.- Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information (short paper).- Program Analysis.- Correlating Structured Inputs and Outputs in Functional Specifications.- Combining Predicate Abstraction with Fixpoint Approximations.- Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis.- Combining Abstract Interpretation with Symbolic Execution for a Static Value Range Analysis of Block Diagrams.- Model Checking.- Program Generation using Simulated Annealing and Model Checking.- LTL Parameter Synthesis of Parametric Timed Automata.- Model checking simulation rules for linearizability.- LTL Model Checking under Fairness in ProB (short paper).- Verification.- Counterexamples from Proof Failures in SPARK.- Proving Termination of Programs with Bitvector Arithmetic by Symbolic Execution.- SMT-based automatic proof of ASM model refinement.- Coq Implementation of OO Verification Framework VeriJ (short paper).- Towards a Proof Framework for Information Systems with Weak Consistency (short paper).- Interaction and Adaptation.- A Cognitive Framework based on Rewriting Logic for the Analysis of Interactive Systems.- Incentive Stackelberg Mean-payoff Games.- Stability-based Adaptation of Asynchronously Communicating Software.- Compliance Checking in the Open Payments Ecosystem (short paper).- Development Methods.- CoCoSpec: A mode aware contract language.- Modularizing Crosscutting Concerns in Component-Based Systems.- Tightening a Contract Refinement.- BMotionWeb: A Tool for Rapid Creation of Formal Prototypes.

    Out of stock

    £40.49

  • Cyber-Physical Systems of Systems: Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy

    Springer International Publishing AG Cyber-Physical Systems of Systems: Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy

    Out of stock

    Book SynopsisThis book is open access under a CC BY 4.0 license.Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today’s infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipment, many embedded systems, and a great number more, strongly depend on systems-of-systems. The correct operation and continuous availability of these underlying systems-of-systems are fundamental for the functioning of our modern society. The 8 papers presented in this book document the main insights on Cyber-Physical System of Systems (CPSoSs) that were gained during the work in the FP7-610535 European Research Project AMADEOS (acronym for Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems). It is the objective of this book to present, in a single consistent body, the foundational concepts and their relationships. These form a conceptual basis for the description and understanding of SoSs and go deeper in what we consider the characterizing and distinguishing elements of SoSs: time, emergence, evolution and dynamicity.Table of ContentsBasic concepts on systems of systems.- interfaces in evolving cyber-physical systems-of-systems.- emergence in cyber-physical systems-of-systems (CPSOSS).- AMADEOS sysml profile for SoS conceptual modeling.- AMADEOS framework and supporting tools.- time and resilient master clocks in cyber-physical systems.- managing dynamicity in SoS.- case study definition and implementation.

    Out of stock

    £40.49

  • Software Technologies: Applications and

    Springer International Publishing AG Software Technologies: Applications and

    Out of stock

    Book SynopsisThis book contains the thoroughly refereed technical papers presented in six workshops collocated with the International Conference on Software Technologies: Applications and Foundations, STAF 2016, held in Vienna, Austria, in July 2016. The six workshops whose papers are included in this volume are: DataMod, GCM, HOFM, MELO, SEMS, and VeryComp. The 33 full and 3 short papers presented were carefully reviewed and selected from 53 submissions. They focus on practical and foundational advances in software technology covering a wide range of aspects including formal foundations of software technology, testing and formal analysis, graph transformations and model transformations, model driven engineering, and tools.Table of ContentsPractical and foundational advances in software technology.- Formal foundations of software technology.- Testing and formal analysis.- Graph transformations and model transformations.- Model driven engineering, and tools.

    Out of stock

    £40.49

  • Web Service Implementation and Composition

    Springer International Publishing AG Web Service Implementation and Composition

    Out of stock

    Book SynopsisThis book embarks on a mission to dissect, unravel and demystify the concepts of Web services, including their implementation and composition techniques. It provides a comprehensive perspective on the fundamentals of implementation standards and strategies for Web services (in the first half of the book), while also presenting composition techniques for leveraging existing services to create larger ones (in the second half). Pursuing a unique approach, it begins with a sound overview of concepts, followed by a targeted technical discussion that is in turn linked to practical exercises for hands-on learning. For each chapter, practical exercises are available on Github.Mainly intended as a comprehensive textbook on the implementation and composition of Web services, it also offers a useful reference guide for academics and practitioners. Lecturers will find this book useful for a variety of courses, from undergraduate courses on the foundational technology of Web services through graduate courses on complex Web service composition. Students and researchers entering the field will benefit from the combination of a broad technical overview with practical self-guided exercises. Lastly, professionals will gain a well-informed grasp of how to synthesize the concepts of conventional and “newer” breeds of Web services, which they can use to revise foundational concepts or for practical implementation tasks.Table of Contents1 Introduction to Service Oriented Architecture.- 1.1 The Service Oriented Architecture Paradigm.- 1.1.1 Goals of Service Orientation.- 1.1.2 What is a Service?.- 1.1.3 The SOA Architectural Stack.- 1.2 Service Composition and Data-Flow.- 1.2.1 Data-Flow Paradigms.- 1.2.2 Composition Techniques.- 1.2.3 End-user Mashups.- 1.3 Goals, Structure and Organization.- 1.4 Lab Exercise 00 – Practical Exercise Environment Setup.- 1.4.1 SOA-Book Github Site.- 1.4.2 Preliminaries.- 1.4.3 Installing Apache Maven and Eclipse Maven Plug-in.- 2 Web Services - SOAP and WSDL.- 2.1 Simple Object Access Protocol (SOAP).- 2.1.1 Binding SOAP Messages to a Transportation Protocol.- 2.1.2 SOAP Extension using SOAP Headers.- 2.2 Web Services Description Language (WSDL).- 2.3 WSDL Main Elements.- 2.4 Message Communication Model in SOAP/WSDL.- 2.4.1 RPC-style.- 2.4.2 Document-style.- 2.5 Lab Exercise 01 – Developing simple Web services with Apache CXF and Maven.- 2.5.1 Activity 1: Hello World with Apache CXF.- 2.5.2 Activity 2: Building Simple Services.- 2.6 Lab Exercise 02: Fault handling in Apache CXF and Web service client development.- 2.6.1 Activity 1: Adding SOAP Faults to Top Down Simple Service.- 2.6.2 Activity 2: Developing a Web Service Client Application.- 3 Web Services - REST or Restful Services.- 3.1 REST Design Principles.- 3.2 Resources.- 3.3 Resource Identification.- 3.4 Addressability.- 3.5 Statelessness.- 3.6 Resource Representations.- 3.7 Uniform Interfaces in REST.- 3.8 Web API Design for RESTful services.- 3.8.1 Designing URIs.- 3.8.2 Design of the Responses.- 3.8.3 HATEOAS - Taking your API to the Next Level.- 3.9 REST-based Service Implementation.- 3.9.1 Building REST Web services.- 3.10 Lab Exercise 03: A Simple REST Service with Apache CXF (JAX-RS).- 3.10.1 Activity 1: Start with Hello World.- 3.10.2 Activity 2: Testing the HelloWorld service.- 3.10.3 Activity 3: CRUD Operations on Resources.- 3.10.4 Activity 4: Developing a Client for RESTful Services.- 4 Web Services - Data Services.- 4.1 Data Services.- 4.1.1 WS-* and RESTful services.- 4.1.2 Data Access as a Service.- 4.2 Implementing Data Services.- 4.3 XML Transformation and Query Techniques.- 4.3.1 XPath.- 4.3.2 XSLT.- 4.3.3 XQuery.- 4.4 Exposing Data as Services.- 4.5 Lab04: Data Service Enablers - XSLT and XQuery.- 4.5.1 Working through XSLT examples.- 4.5.2 Working through XQuery examples.- 5 Web Service Composition: Overview.- 5.1 From Atomic to Composite Services.- 5.2 Service Orchestration vs. Service Choreography.- 5.3 Service Composition View from Orchestration and Choreography.- 5.4 Benefits of Web service composition.- 5.5 Web Service Composition Environment.- 6 Web Service Composition: Control Flows.- 6.1 BPEL (Business Process Execution Language).- 6.1.1 BPEL Model.- 6.1.2 BPEL Example.- 6.2 BPMN (Business Process Model and Notation).- 6.2.1 BPMN Model.- 6.2.2 BPMN Example.- 6.3 Lab Exercise 05: Web service composition with BPEL and Apache ODE.- 6.3.1 Software Setup.- 6.3.2 Activity 1: Hello World in BPEL.- 6.3.3 Activity 2: Simple Home Loan Process Service.- 7 Web Service Composition: Data Flows.- 7.1 Data-Flow Paradigms.- 7.1.1 Blackboard.- 7.1.2 Explicit Data Flow.- 8 Service Component Architecture (SCA).- 8.1 Introduction to SCA.- 8.1.1 The SOA Integration Problem.- 8.1.2 Overview of SCA.- 8.1.3 Application of SCA to Use-Case.- 8.1.4 SCA Runtime.- 8.1.5 Benefits of SCA.- 8.2 The Stock Application.- 8.3 The SCA Assembly Model.- 8.3.1 SCA composite.- 8.3.2 SCA Component.- 8.4 Lab Exercise 06: SCA.- 8.4.1 Activity 1: Building the first SCA composite – Hello World Service.- 8.4.2 Activity 2: Building the Stock Application.- 9 Conclusion.- References.- Index.

    Out of stock

    £42.74

  • Requirements Engineering

    Springer International Publishing AG Requirements Engineering

    1 in stock

    Book SynopsisWritten for those who want to develop their knowledge of requirements engineering process, whether practitioners or students.Using the latest research and driven by practical experience from industry, Requirements Engineering gives useful hints to practitioners on how to write and structure requirements. It explains the importance of Systems Engineering and the creation of effective solutions to problems. It describes the underlying representations used in system modeling and introduces the UML2, and considers the relationship between requirements and modeling. Covering a generic multi-layer requirements process, the book discusses the key elements of effective requirements management. The latest version of DOORS (Version 7) - a software tool which serves as an enabler of a requirements management process - is also introduced to the reader here.Additional material and links are available at: http://www.requirementsengineering.infoTable of ContentsIntroduction.- A Generic Process for Requirements Engineering.- System Modelling for Requirements Engineering.- Writing and Reviewing Requirements.- Requirements Engineering in the Problem Domain.- Requirements Engineering in the Solution Domain.- Advanced Traceability.- DOORS: A Tool to Manage Requirements.- Management Aspects of Requirements Engineering.-

    1 in stock

    £56.99

  • Formal Methods: Foundations and Applications: 20th Brazilian Symposium, SBMF 2017, Recife, Brazil, November 29 — December 1, 2017, Proceedings

    Springer International Publishing AG Formal Methods: Foundations and Applications: 20th Brazilian Symposium, SBMF 2017, Recife, Brazil, November 29 — December 1, 2017, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 20th Brazilian Symposium on Formal Methods, SBMF 2017, which took place in Recifel, Brazil, in November/December 2017.The 16 papers presented together with three invited talks were carefully reviewed and selected from 37 submissions. They are organized in the following topical sections: formal methods integration and experience reports; model checking; refinement and verification; and semantics and languages.The chapter 'Rapidly Adjustable Non-Intrusive Online Monitoring for Multi-core Systems' is published open access under a CC BY 4.0 license.Table of ContentsFormal methods integration and experience reports.- Model checking.- Refinement and verification.- Semantics and languages.

    1 in stock

    £49.49

  • Big Data for Urban Sustainability: A

    Springer International Publishing AG Big Data for Urban Sustainability: A

    1 in stock

    Book SynopsisThis book presents a practical framework for the application of big data, cloud, and pervasive and complex systems to sustainable solutions for urban environmental challenges. It covers the technologies, potential, and possible and impact of big data on energy efficiency and the urban environment.The book first introduces key aspects of big data, cloud services, pervasive computing, and mobile technologies from a pragmatic design perspective, including sample open source firmware. Cloud services, mobile and embedded platforms, interfaces, operating system design methods, networking, and middleware are all considered. The authors then explore in detail the framework, design principles, architecture and key components of developing energy systems to support sustainable urban environments. The included case study provides a pathway to improve the eco-efficiency of urban transport, demonstrating how to design an energy efficient next generation urban navigation system by leveraging vast cloud data sets on user-behavior. Ultimately, this resource maps big data’s pivotal intersection with rapid global urbanization along the path to a sustainable future.Table of ContentsPart I Features of Big data Systems.- Big Data Introduction.-Big data Systems landscape/ overview.- Part II Developing Sustainable Big data systems.- The trends of Big data systems.- Platform Architecture.- Reference Architecture.- ISUNS system design (Case Study).- Part III Future Development to Enhance Eco-efficiency.- Potential Applications for Big data systems.- Performance Evaluation.

    1 in stock

    £98.99

  • The Essence of Software Engineering

    Springer International Publishing AG The Essence of Software Engineering

    1 in stock

    Book SynopsisThis open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research findings dealing with current practical software engineering issues and also pointers to potential future developments.Celebrating the 20th anniversary of adesso AG, adesso gathered some of the pioneers of software engineering including Manfred Broy, Ivar Jacobson and Carlo Ghezzi at a special symposium, where they presented their thoughts about latest software engineering research and which are part of this book. This way it offers readers a concise overview of the essence of software engineering, providing valuable insights into the latest methodological research findings and adesso’s experience applying these results in real-world projects.Table of Contents1 The Leading Role of Software and Systems Architecture in the Age of Digitization.- 2 Formal Methods and Agile Development: Towards a Happy Marriage.- 3 Escaping Method Prison – On the Road to Real Software Engineering.- 4 What is software?: The Role of Empirical Methods in Answering the Question.- 5 Only the Architecture You Need.- 6 Variability in standard software products Introducing software product line engineering to the insurance industry.- 7 Using Design Thinking for Requirements Engineering in the Context of Digitalization and Digital Transformation – a Motivation and an Experience Report.- 8 Towards Deviceless Edge Computing: Challenges, Design Aspects & Models for Serverless paradigm at the Edge .- 9 Data-driven decisions and actions in today’s software development.- 10 Software Architecture: Past, Present, Future.- 11 Software Product Lines.- 12 Enabling Flexible and Robust Business Process Automation for the Agile Enterprise.- 13 Achievements, Failures, and the Future of Model-based Software Engineering.

    1 in stock

    £40.49

  • A Study Guide to the ISTQB® Foundation Level 2018

    Springer International Publishing AG A Study Guide to the ISTQB® Foundation Level 2018

    1 in stock

    Book SynopsisThis book is an excellent, helpful and up-to-date resource for all candidates preparing for the ISTQB Foundation Level certification exam based on the new Foundation Level 2018 Syllabus. Although there are plenty of sample questions and information related to the Foundation Level exam on the web, there are two problems with these: Firstly, most of them will soon be outdated, as the old syllabus and exams are going to be retracted in June 2019. Secondly, much of what is available is of poor quality, since many of the sample questions do not follow the strict ISTQB examination rules.This book stands out from other ISTQB-related works through a number of special features: Topicality: The material complies with the latest version of the Foundation Level syllabus published in 2018. Quality and originality: The exam questions are original, not redundant, of high quality, fully aligned with the ISTQB exam requirements and have not been published before. Huge amount of material: It includes 5 full sample exams (200 questions in total) designed in accordance with the ISTQB exam rules, and with the appropriate distribution of questions regarding the learning objectives and K-levels. Well-thought-out sample questions: The questions not only appropriately cover the corresponding learning objectives (LOs), but also to show the typical pitfalls. Diversity: The questions from various sample exams related to the same LO are diversified, that is, each of them points out different aspects of a given LO. This is an excellent method for better and more effective learning and preparing for the exam. Comprehensive, intelligible explanations: All answers are justified and there are detailed and easy-to-understand explanations not only of why a given answer is correct, but also why all the others are wrong. A lot of bonus material: The book includes a great bonus pack: chapters that explain the white-box and black-box test techniques in a detailed way, a set of exercises on test techniques and the detailed solutions to them, and much more. Table of Contents1 2018 Foundation Syllabus Overview.- 2 ISTQB Foundation Level Exam Structure and Rules.- 3 Test Techniques and Exercises.- 4 Black-box Testing Techniques.- 5 White-box test techniques.- 6 Sample Exam – Question Set 1.- 7 Sample Exam – Question Set 2.- 8 Sample Exam – Question Set 3.- 9 Sample Exam – Question Set 4.- 10 Sample Exam – Question Set 5.- 11 Solutions to Exercises on Test Techniques.- 12 Answers to Question Set 1.- 13 Answers to Question Set 2.- 14 Answers to Question Set 3.- 15 Answers to Question Set 4.- 16 Answers to Question Set 5.- Appendix A: Foundation Syllabus Glossary Terms.- Appendix B: Questions distribution by Learning Objectives.

    1 in stock

    £47.49

  • SafeScrum® – Agile Development of Safety-Critical

    Springer International Publishing AG SafeScrum® – Agile Development of Safety-Critical

    Out of stock

    Book SynopsisThis book addresses the development of safety-critical software and to this end proposes the SafeScrum® methodology. SafeScrum® was inspired by the agile method Scrum, which is extensively used in many areas of the software industry. Scrum is, however, not intended or designed for use with safety-critical systems; hence the authors propose guidelines and additions to make it both practically useful and compliant with the additional requirements found in safety standards.The book provides an overview of agile software development and how it can be linked to safety and relevant safety standards. SafeScrum® is described in detail as a useful approach for reaping the benefits of agile methods, and is intended as a set of ideas and a basis for adaptation in industry projects. The book covers roles, processes and practices, and documentation. It also includes tips on how standard software process tools can be employed. Lastly, some insights into relevant research in this new and emerging field are provided, and selected real-world examples are presented.The ideas and descriptions in this book are based on collaboration with the industry, in the form of discussions with assessment organizations, general discussions within the research fields of safety and software, and last but not least, the authors’ own experiences and ideas. It was mainly written for practitioners in industry who know a great deal about how to produce safety-critical software but less about agile development in general and Scrum in particular.Table of ContentsPreface.- Acknowledgements.- Glossary.- 1 Why you should read this book.- 2 What is agile software development - a short intro.- 3 What is safety-critical software.- 4 Placing agile in a safety context.- 5 Standards and certification.- 6 The SafeScrum process.- 7 SafeScrum activities.- 8 SafeScrum additional elements.- 9 Documentation and proof-of-compliance.- Annexes A-B-C-D The SafeScrum handbook.

    Out of stock

    £61.74

  • Programmieren in C#: Von den ersten Gehversuchen

    Springer Fachmedien Wiesbaden Programmieren in C#: Von den ersten Gehversuchen

    1 in stock

    Book SynopsisLernen Sie Programmieren mit Freude. Zahlreiche Beispiele machen den Einstieg in schwierige Themen einfach. Datenstrukturen und Algorithmen werden so in ihrem vollen Umfang anschaulich dargestellt. Anhand vieler Übungsaufgaben kann das Erlernte direkt ausprobiert werden. Ausführliche Lösungen erleichtern das Selbststudium und sichern den Lernerfolg. Table of ContentsEinführung in die objektorientierte Programmierung - Darstellung von Daten - Das NET-Framework - Vordefinierte Datentypen - Arrays - Operationen und Ausdrücke - Statische Methoden und Variablen - Programmsteuerung - Klassen und Objekte

    1 in stock

    £28.49

  • Programmieren in Pascal: Ein einführendes

    Springer Fachmedien Wiesbaden Programmieren in Pascal: Ein einführendes

    1 in stock

    Book Synopsis0 Einleitung und Notationen.- 0.1 Historische Entwicklung.- 0.2 Einführende Beispiele.- 0.3 Schreibweisen.- 0.4 Testfragen.- 1 Einfache Datentypen und Ein/Ausgabe.- 1.1 AufZählungstypen und Unterbereichstypen.- 1.2 CHAR, siehe A.2.2.- 1.3 BOOLEAN, siehe A.2.2.- 1.4 Ordinale und Simple Typen.- 1.5 Zahlbezeichnungen.- 1.6 INTEGER, siehe A.2.2.- 1.7 REAL, siehe A.2.2.- 1.8 String, vgl. 5.3.- 1.9 Einfache Ein/Ausgabe mit READ, WRITE.- 1.10 Testfragen.- 2 Einfacher Programmaufbau.- 2.1 Verfügbarmachung externer Dateien, vgl. 8.- 2.2 Vereinbarungen.- 2.3 Testfragen.- 3 Ausdrücke.- 3.1 Primärausdrücke.- 3.2 Ausdrücke, allgemein.- 3.3 Testfragen.- 4 Anweisungen.- 4.1 Assignment Statement.- 4.2 Empty Statement.- 4.3 IF Statement.- 4.4 CASE Statement.- 4.5 Schleifen.- 4.6 Folgen von Anweisungen (compound statement).- 4.7 Label, GOTO Statement.- 4.8 Testfragen.- 5 Reihung (Array) und Mengenbildung (SET).- 5.1 Reihungstyp, Komponente.- 5.2 PACKED, vgl. A.2.5.2.- 5.3 String, vgl. 1.8.- 5.4 Potenzmengentyp, Mengen-Aggregat.- 5.5 Testfragen.- 6 Zeiger und Verbund.- 6.1 Zeiger (^ Symbol).- 6.2 Verbund (RECORD).- 6.3 Testfragen.- 7 Unterprogramme.- 7.1 Unterprogramm-Technik.- 7.2 Parameterübergabe.- 7.3 Konforme Reihungsschemata (level 1 implementation).- 7.4 Prozedur (PROCEDURE).- 7.5 Funktion (FUNCTION).- 7.6 Rundreise-Problem.- 7.7 Bereichsschachtelung.- 7.8 Testfragen.- 8 Datei (File).- 8.l Sequentieller Dateityp, Modus, Komponente.- 8.2 Text-Datei (TEXT), siehe A.2.2/5/6.- 8.3 Testfragen.- A Anhang.- A. l Syntax-Diagramme.- A.2 Standard-Bibliothek (Vordefinierte Vereinbarungen).- A.2.1 Standard-Konstanten.- A.2.2 Standard-Typen.- A.2.3 Standard-Operationen.- A.2.3.1 Arithmetic Operations.- A.2.3.2 Relational Operations.- A.2.3.3 Boolean Operations.- A.2.3.4 Set Operations.-A.2.3.5 Other Operations'.- A.2.4 Standard-Funktionen.- A.2.4.1 Arithmetic Functions.- A.2.4.2 Boolean Functions (Predicates).- A.2.4.3 Transfer Functions.- A.2.4.4 Further Standard Functions.- A.2.5 Standard-Prozeduren.- A.2.5.1 Dynamic Allocation Procedures.- A.2.5.2 Data Transfer Procedures.- A.2.5.3 File Handling Procedures.- A.2.5.4 Input- Procedures READ and READLN.- A.2.5.5 Output-Procedures WRITE and WRITELN.- A.2.6 Standard-Dateien INPUT, OUTPUT.- Übg Übungsaufgaben.- Geordnet nach dem ACM-Index.- Lit Literaturverzeichnis.- Lit. l Lehrbücher.- Lit.2 Anwendungen.- Ind Alphabetischer Index.- Fachausdrücke, deutsch/englisch.Table of Contents0 Einleitung und Notationen.- 0.1 Historische Entwicklung.- 0.2 Einführende Beispiele.- 0.2.1 Anzahl der Buchstaben E/e in einem Satz.- 0.2.2 Turm von Hanoi, rekursive Lösung.- 0.3 Schreibweisen.- 0.3.1 Quelltext-Zeichen und lexikalische Symbole.- 0.3.2 Verwendung des Syntax-Diagramms, siehe A.1.- 0.3.3 Kommentar.- 0.4 Testfragen.- 1 Einfache Datentypen und Ein/Ausgabe.- 1.1 AufZählungstypen und Unterbereichstypen.- 1.2 CHAR, siehe A.2.2.- 1.3 BOOLEAN, siehe A.2.2.- 1.4 Ordinale und Simple Typen.- 1.5 Zahlbezeichnungen.- 1.6 INTEGER, siehe A.2.2.- 1.7 REAL, siehe A.2.2.- 1.8 String, vgl. 5.3.- 1.9 Einfache Ein/Ausgabe mit READ, WRITE.- 1.10 Testfragen.- 2 Einfacher Programmaufbau.- 2.1 Verfügbarmachung externer Dateien, vgl. 8.- 2.2 Vereinbarungen.- 2.2.1 Zielvereinbarung (LABEL).- 2.2.2 Konstantenvereinbarung (CONST).- 2.2.3 Typvereinbarung (TYPE).- 2.2.4 Variablenvereinbarung (VAR).- 2.3 Testfragen.- 3 Ausdrücke.- 3.1 Primärausdrücke.- 3.1.1 Aufrufe von Standard-Funktionen, siehe A.2.4.- 3.1.2 Rundung ROUND, Abschneiden TRUNC.- 3.2 Ausdrücke, allgemein.- 3.2.1 Prioritäten von Operatoren.- 3.2.2 Ganzahlige Division DIV, Rest MOD.- 3.3 Testfragen.- 4 Anweisungen.- 4.1 Assignment Statement.- 4.2 Empty Statement.- 4.3 IF Statement.- 4.4 CASE Statement.- 4.5 Schleifen.- 4.5.1 FOR Statement.- 4.5.2 WHILE Statement.- 4.5.3 REPEAT Statement.- 4.6 Folgen von Anweisungen (compound statement).- 4.7 Label, GOTO Statement.- 4.8 Testfragen.- 5 Reihung (Array) und Mengenbildung (SET).- 5.1 Reihungstyp, Komponente.- 5.2 PACKED, vgl. A.2.5.2.- 5.3 String, vgl. 1.8.- 5.4 Potenzmengentyp, Mengen-Aggregat.- 5.5 Testfragen.- 6 Zeiger und Verbund.- 6.1 Zeiger (^ Symbol).- 6.1.1 Zeigertyp, Allokation, Selektor.- 6.2 Verbund (RECORD).- 6.2.1 Verbundtyp, Komponente, Selektor.- 6.2.2 Namensabkürzung für Komponenten (WITH).- 6.3 Testfragen.- 7 Unterprogramme.- 7.1 Unterprogramm-Technik.- 7.1.1 Unterprogramm-Vereinbarung, FORWARD- Spezifikation.- 7.1.2 Unterprogramm-Aufruf, Rekursion.- 7.2 Parameterübergabe.- 7.2.1 Wert-Parameter.- 7.2.2 VAR -Parameter.- 7.2.3 Unterprogramm-Parameter.- 7.3 Konforme Reihungsschemata (level 1 implementation).- 7.4 Prozedur (PROCEDURE).- 7.5 Funktion (FUNCTION).- 7.6 Rundreise-Problem.- 7.7 Bereichsschachtelung.- 7.7.1 Vereinbart / nicht vereinbart.- 7.7.2 Lokal / global.- 7.7.3 Erzeugt / nicht erzeugt, Ausnahmen.- 7.7.4 Aufrufbar / unterdrückt.- 7.7.5 Bereichsfreie Größen, Speicherbereinigung,u.a.m..- 7.8 Testfragen.- 8 Datei (File).- 8.l Sequentieller Dateityp, Modus, Komponente.- 8.2 Text-Datei (TEXT), siehe A.2.2/5/6.- 8.3 Testfragen.- A Anhang.- A. l Syntax-Diagramme.- A.2 Standard-Bibliothek (Vordefinierte Vereinbarungen).- A.2.1 Standard-Konstanten.- A.2.2 Standard-Typen.- A.2.3 Standard-Operationen.- A.2.3.1 Arithmetic Operations.- A.2.3.2 Relational Operations.- A.2.3.3 Boolean Operations.- A.2.3.4 Set Operations.- A.2.3.5 Other ‘Operations’.- A.2.4 Standard-Funktionen.- A.2.4.1 Arithmetic Functions.- A.2.4.2 Boolean Functions (Predicates).- A.2.4.3 Transfer Functions.- A.2.4.4 Further Standard Functions.- A.2.5 Standard-Prozeduren.- A.2.5.1 Dynamic Allocation Procedures.- A.2.5.2 Data Transfer Procedures.- A.2.5.3 File Handling Procedures.- A.2.5.4 Input- Procedures READ and READLN.- A.2.5.5 Output-Procedures WRITE and WRITELN.- A.2.6 Standard-Dateien INPUT, OUTPUT.- Übg Übungsaufgaben.- Geordnet nach dem ACM-Index.- Lit Literaturverzeichnis.- Lit. l Lehrbücher.- Lit.2 Anwendungen.- Ind Alphabetischer Index.- Fachausdrücke, deutsch/englisch.

    1 in stock

    £38.69

  • Pattern Recognition and Image Processing in C++

    Springer Fachmedien Wiesbaden Pattern Recognition and Image Processing in C++

    1 in stock

    Book SynopsisParts of this text were used for several years by students in a one~term under­ graduate course in computer science. The students had to prepare projects in small groups (2~4 students).1 This book emphasizes practical experience with image processing. It offers a comprehensive study of • image processing and image analysis, • basics of speech processing, • object~oriented programming, • software design, • and programming in C++. The book is divided into four parts. In the first part we introduce image processing, image analysis, programming tools, and the basics of C++. In the second part we describe object~oriented programming in general and the possible applications of object~oriented concepts in C++. Several appli­ cations of object~oriented programming for image processing are discussed as well. The new features of C++ are introduced entirely through the use of examples. We cover the proper representation of the data that is a result of pattern analysis as well. The third part describes a complete system for image segmentation. Some of the material covered refers to the exercises found in the first and second parts: this verifies our belief that an image segmentation system of programs can be developed while simultaneously acquainting others to C++. We combine the data representation described in the second part with the algorithms that use and manipulate them here in the third part.Table of ContentsI Introductions.- 1 Pattern Recognition.- 1.1 Images and Sound.- 1.2 Applications of Pattern Recognition.- 1.3 Environment, Problem Domain, and Patterns.- 1.4 Characterization of Pattern Recognition.- 1.5 Recording of Speech Signals.- 1.6 Video Cameras and Projections.- 1.7 From Continuous to Digital Signals.- 1.8 Sampling Theorem in Practice.- 1.9 Visualization and Sound Generation.- 2 From C to C++.- 2.1 Syntax Notation.- 2.2 Principle of C++ Compilation.- 2.3 Function Calls and Arguments.- 2.4 Declaration and Definition of Variables.- 2.5 Unix-File Access via Standard Functions.- 2.6 Formatted Input and Output.- 2.7 Main Program.- 2.8 Preprocessor Directives.- 2.9 Conditional Compilation.- 3 Software Development.- 3.1 Software for Pattern Recognition.- 3.2 Principles of Software Development.- 3.3 Modular and Structured Programming.- 3.4 Comments and Program Layout.- 3.5 Documentation.- 3.6 Teamwork.- 3.7 Efficiency.- 3.8 Tools for Software Development with Unix.- 3.9 PUMA.- 4 Expressions, Statements, Functions.- 4.1 Instructions and Expressions.- 4.2 Logical Values and Conditionals.- 4.3 Function Definition.- 4.4 Loops.- 4.5 Declarations and Scope.- 4.6 Switches.- 4.7 Linkage.- 4.8 Programming with Modules.- 4.9 Control Structures.- 5 Classification and Pattern Analysis.- 5.1 Classification.- 5.2 Preprocessing.- 5.3 Feature Extraction.- 5.4 Analysis.- 5.5 Image Segmentation.- 5.6 Speech Segmentation.- 5.7 Pattern Understanding.- 5.8 Active Vision and Real Time Processing.- 5.9 Top-Level Loop for Speech Analysis.- 6 Arrays and Pointers.- 6.1 Vectors and Matrices.- 6.2 Pointers.- 6.3 Vectors vs. Pointers.- 6.4 Vector Initialization.- 6.5 Strings.- 6.6 Pointers Operations and Allocation.- 6.7 Pointer and Array Arguments.- 6.8 Pointer to Pointer.- 6.9 Main Function Arguments.- 7 Statistics for Pattern Recognition.- 7.1 Axioms.- 7.2 Discrete Random Variables.- 7.3 Continuous Random Variables.- 7.4 Mean and Variance.- 7.5 Moments of a Distribution.- 7.6 Random Vectors.- 7.7 Statistical Features and Entropy.- 7.8 Signal-to-Noise Ratio.- 7.9 Histograms.- 8 C++ as a better C.- 8.1 Type Declaration.- 8.2 Type Conversion for Pointers.- 8.3 Bit- and Shift-Operations.- 8.4 Type Specifiers and Variable Declaration.- 8.5 Type-Safe Linkage.- 8.6 Overloaded Function Names.- 8.7 Return Value and Arguments.- 8.8 Macros and Inline Functions.- 8.9 Function Pointers.- II Object-Oriented Pattern Analysis.- 9 Object-Oriented Programming.- 9.1 Object-Oriented Software Techniques.- 9.2 Basic Concepts.- 9.3 Data Abstraction and Modules.- 9.4 Inheritance.- 9.5 Abstract Classes.- 9.6 Object-Oriented Classification.- 9.7 Polymorphism.- 9.8 Other Object-Oriented Concepts.- 9.9 Class Libraries.- 10 Classes in C++.- 10.1 Structures.- 10.2 Methods and ADT’s.- 10.3 Class Declarations.- 10.4 Object Construction.- 10.5 Destruction of Objects.- 10.6 Overloaded Operators.- 10.7 Advanced Methods and Constructors.- 10.8 Vector Class.- 10.9 Class Design.- 11 Intensity Images.- 11.1 Array Class.- 11.2 Templates in C++.- 11.3 Images.- 11.4 External Data Formats.- 11.5 Binary Images.- 11.6 Color Images.- 11.7 Sub Images.- 11.8 Image Transformation and Registration.- 11.9 Neighborhood.- 12 Inheritance in C++-Classes.- 12.1 Motivation and Syntax.- 12.2 Base Class Access.- 12.3 Construction and Destruction.- 12.4 Pointer to Objects.- 12.5 Virtual Functions.- 12.6 Abstract Classes.- 12.7 Image Class Hierarchy.- 12.8 Multiple Inheritance.- 12.9 Implementation Issues.- 13 Edge Detection and Edge Images.- 13.1 Motivation.- 13.2 Strategies.- 13.3 Discrete Derivative of the Intensity.- 13.4 Sobel and Prewitt Operator.- 13.5 Bit Fields in C++.- 13.6 Unions in C++.- 13.7 Edge Class.- 13.8 Edge Images.- 13.9 Color Edge Operators.- 14 Class Libraries.- 14.1 Stream Input and Output.- 14.2 NIH Class Library.- 14.3 Dynamic Class Descriptions.- 14.4 Static Class Members.- 14.5 Input and Output for Objects.- 14.6 Strings.- 14.7 Container Classes.- 14.8 Time and Date.- 14.9 More Classes.- 15 Hierarchy of Picture Processing Objects.- 15.1 General Structure.- 15.2 Hippos Object.- 15.3 Images and Matrices.- 15.4 Chain Code Class.- 15.5 Enumerations and Scope Resolution.- 15.6 Polygonal Representation.- 15.7 Atomic Objects.- 15.8 Segmentation Objects.- 15.9 External Representation.- 16 Spectral Features and Speech Processing.- 16.1 Fourier Series and Fourier Transform.- 16.2 Discrete Fourier Transform.- 16.3 Fast Fourier Transform.- 16.4 2D Fourier Transform.- 16.5 Short time Fourier analysis.- 16.6 Linear Predictive Coding.- 16.7 Dynamic Time Warping.- 16.8 Hidden Markov Models.- 16.9 Different Types of Hidden Markov Modells.- III Pattern Recognition Algorithms.- 17 An Image Analysis System.- 17.1 Data Flow.- 17.2 Design of ANIMALS.- 17.3 XDR.- 17.4 Display and Capture.- 17.5 Graphical User Interfaces.- 17.6 Geometric Distortions.- 17.7 Polymorphic image processing.- 17.8 Efficiency.- 17.9 Image Segmentation Program.- 18 Synthetic Signals and Images.- 18.1 Synthetic Sound.- 18.2 Geometric Patterns.- 18.3 Pixel Noise.- 18.4 Gaussian Noise.- 18.5 Salt-and-Pepper Noise.- 18.6 Different Views of a 3D Polyhedral Object.- 18.7 Digits and Letters.- 18.8 Single Stereo Images.- 18.9 Spectrogram.- 19 Filtering and Smoothing Signals.- 19.1 Mean-Filter and Gaussian-Filter.- 19.2 Median-Filter.- 19.3 Smoothed Median-Filter.- 19.4 Edge Preserving Smoothing.- 19.5 K-Nearest Neighbor Averaging.- 19.6 Conditional Average Filter.- 19.7 Linear Reconstruction.- 19.8 Elimination of Noisy Image Rows.- 19.9 Resolution Hierarchies.- 20 Histogram Algorithms.- 20.1 Discriminant and Least Squares Threshold.- 20.2 Histogram Entropy Thresholding.- 20.3 Multithresholding.- 20.4 Local Histogram Equalization.- 20.5 Lookup Table Transformation.- 20.6 A Class for Histograms.- 21 Edge Images.- 21.1 Robert’s Cross.- 21.2 Second Derivative.- 21.3 Edge Model Masks.- 21.4 Alternative Methods.- 21.5 Thinning of Edge Images.- 21.6 Edge Thresholding.- 21.7 Non Maxima Suppression.- 21.8 Non Maxima Absorption.- 21.9 Class Edge Revisited.- 22 Line Detection Algorithms.- 22.1 Line Detection.- 22.2 Local Connectivity.- 22.3 Hysteresis Thresholds.- 22.4 Closing of Gaps.- 22.5 Zero crossings in Laplace-Images.- 22.6 Hough Transform.- 22.7 Canny Line Detection.- 22.8 Shen and Castan.- 22.9 Representation as Segmentation Objects.- 23 Chain Codes.- 23.1 Length of a Chain.- 23.2 Smoothing.- 23.3 Digital Linear Lines.- 23.4 Similarity.- 23.5 Intersections.- 23.6 Rotation.- 23.7 Conversion.- IV Appendix.- A Basics of C++.- A.1 History.- A.2 Identifier and Constants.- A.3 Basis Data Types in C and C++.- B Software Development Tools.- B.1 Groups and ID’s with Unix.- B.2 Program Building with make.- B.3 The Use of Libraries.- B.4 Version and Access Control with rcs.- C Source Codes and Tools.- C.1 List of Tools.- C.2 How to get the sources.- C.3 X11.- C.4 Slides.- C.5 Addresses.- C.6 Headers and Source Files.- C.7 Dummy Definitions.- C.7.1 Listing of animals/dummy/Dictionary.h.- C.7.2 Listing of animals/dummy/OIOxdr.h.- C.7.3 Listing of animals/ dummy/Represent.h.- C.7.4 Listing of animals/dummy/SeqCltn.h.- C.7.5 Listing of animals/dummy/Set.h.- C.7.6 Listing of animals/dummy/dummies. C.- References.- Figures.- Tables.- Index for Exercises.

    1 in stock

    £98.99

  • Middleware in Java: Leitfaden zum Entwurf

    Springer Fachmedien Wiesbaden Middleware in Java: Leitfaden zum Entwurf

    1 in stock

    Book SynopsisDieses Buch vermittelt beispielhaft das notwendige Know-how zum Entwurf und zur Entwicklung verteilter Anwendungen. Die Umsetzung erfolgt mittels der relevanten Middleware-Technologien in Java. Zunächst werden die grundlegenden Verfahren wie Datenaustausch über Sockets, Parallelisierung durch Threads und Synchronisation über Monitore und Semaphore behandelt. Darauf aufbauend erfährt der Leser alles, was er in der Praxis benötigt, zu Java Message Service (JMS) und Remote Method Invocation (RMI). Die Darstellung erfolgt nachvollziehbar anhand praxisnaher Beispiele, Aufgaben helfen das Gelernte aktiv einzuüben. Zur Kommunikation über verteilte Objekte wird eine Einführung in CORBA gegeben und der Einsatz dieser Architektur anhand der Programmiersprache Java vorgestellt.Table of ContentsArchitektur verteilter Anwendungen - Nebenläufigkeit in Java - Synchronisationsmechanismen - Design und Implementierung von Client/Server-Software über Sockets - Serialisierung - Verteilte Objekte über Remote Method Invocation - Einführung in CORBA - Java Message Service (JMS): Schnittstelle für nachrichtenorientierte Middleware - Online-Service mit Quellcode, Aufgaben und Powerslides

    1 in stock

    £31.34

  • Java ist eine Sprache: Java lesen, schreiben und

    Springer Fachmedien Wiesbaden Java ist eine Sprache: Java lesen, schreiben und

    1 in stock

    Book SynopsisProfitieren Sie von diesem einfachen Ansatz, Java zu erlernen, damit das Lesen, Schreiben und Ausführen von Programmen gelingt! Eine präzise und verständliche Einführung in die Programmierung, mit sauberen Begriffen, klarer und nachvollziehbarer Darstellung und korrekter Methodik. Berücksichtigt wird J2SE in der Version 5.0, so dass auch Generische Einheiten, Aufzählungstypen und viele andere wichtige Spracheigenschaften zum Zuge kommen. Unterstützende Daten stehen dem Leser kostenlos im Web zur Verfügung. Trade Review"Ziel des Autors ist, in das Arbeiten mit Java möglichst einfach und verständlich einzuführen. Er verwendet oft anschauliche Begriffe aus der Allgemeinsprache [...]. Dennoch bleibt der Autor aber stets präzise. Die didaktisch geschickte Darstellung stützt sich auf viele Beispiele, Schritt-für-Schritt-Anweisungen und Aufgaben mit Lösungsvorschlägen." ekz-Informationsdienst, ID 32/05Table of ContentsProgrammieren als ein Rollenspiel - Drei Arten von Befehlen: Vereinbarungen, Ausdrücke und Anweisungen - Variablen als Bojen darstellen - Reihungen (arrays), einstufige, mehrstufige und mehrdimensionale Vom Modul zur Klasse - Abstrakte Klassen und total abstrakte Klassen (Schnittstellen)

    1 in stock

    £34.19

  • Software Development Tools

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Software Development Tools

    15 in stock

    Book SynopsisThis text contains the proceedings of a workshop on software develoDment tools, held at Pingree Park, Colorado in May, 1979. The workshop, for which we were co-chair­ men, was primarily, but not exclusively, concerned with a variety of tools supporting pre-implementation phases of software development. The workshop brought together researchers and practitioners from industrial, governmental, and academic sectors to compare and assess current work and to set some directions for future work in this emerging technical area. The fifty participants represented research and development efforts in software tools within the United States, Canada, France, Great Britain, and Japan. (A list of participants appears at the end of the text. ) Sponsorship was provided by the National Aeronautics and Space Administration, the National Bureau of Standards, the National Science Foundation, and Digital Equipment Corporation. The conference consisted of seven formal sessions and numerous organized and impromptu discussions. Each session (except the last) included invited papers, prepared remarks by discussants, and an open discussion.Table of ContentsI. Introduction.- I. Introduction.- II. Needs.- Tools for Software System Construction.- Issues in the Design of Tools for Distributed Software System Development.- A Critical Look at the Process of Tool Development: An Industrial Perspective.- Discussion.- III. Experiences.- An Experience-based Assessment of Development Systems.- Discussion.- IV. Development Support Systems.- A Software Lifecycle Methodology and Tool Support.- Software Tools and the User Software Engineering Project.- Discussion.- V. Procedural Description Techniques.- The Use of Data Abstraction in Program Design.- Procedural Approaches to Software Design Modelling.- Discussion.- VI. Non-Procedural Description Techniques.- Software Specification Languages Based on Regular Expressions.- A Data Base Approach to Software Specification.- Discussion.- VII. Analysis Tools.- The Role of Verification Tools and Techniques.- Aerospace and Communications Corporation Software Validation and Pre-implementation Issues.- Discussion.- VIII. Summary.- VIII. Summary.- Discussion.- Bibliography and References.- List of Attendees.

    15 in stock

    £42.74

  • The Adaption of Virtual Man-Computer Interfaces to User Requirements in Dialogs

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG The Adaption of Virtual Man-Computer Interfaces to User Requirements in Dialogs

    1 in stock

    Table of ContentsThe user.- User-friendliness.- Special aspects of user behaviour.- to Part II.- Man-computer dialog.- Dialog contents and dialog state.- The three levels of abstraction.- Dialog types.- to Part III.- System objectives.- Conceptual recommendations for man-computer interfaces.

    1 in stock

    £40.49

  • A Pathology of Computer Viruses

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG A Pathology of Computer Viruses

    15 in stock

    Book SynopsisThe 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.Table of Contents1 Introduction.- 1.1 Preamble.- 1.2 What is a Computer Virus?.- 1.3 Worms: Networked Viruses.- 1.4 Terminology.- 2 Historical Perspectives.- 2.1 Introduction.- 2.2 1960s: Early Rabbits.- 2.3 1970s: Fiction and the Worm.- 2.4 1980–1983: Genesis.- 2.5 1984–1986: Exodus.- 2.6 1987: Mac, Atari and Amiga Next.- 2.7 1988: Proliferation and Disbelief.- 2.7.1 January-March.- 2.7.2 April-September.- 2.7.3 October-December.- 2.8 1989: Reaction by the Community.- 2.8.1 January-March.- 2.8.2 April-June.- 2.8.3 July-September.- 2.8.4 October-December.- 2.9 1990: Organisation and Litigation.- 2.9.1 January-April.- 2.9.2 May-September.- 2.9.3 October-December.- 2.10 Summary.- 3 Theory of Viruses.- 3.1 Introduction.- 3.2 Addition of Viral Code.- 3.3 Detection of Viruses.- 3.4 Classes of Viruses.- 3.5 Thompson: and Trusting Trust.- 3.6 Biological Analogies.- 3.6.1 Biological Viruses.- 3.6.2 Parallels Between Low Level Operation.- 3.6.3 High Level Parallels.- 3.7 Quest for Life.- 3.8 Evolution: Genetic Algorithms.- 3.8.1 Random Mutation.- 3.8.2 Programmed Mutation.- 3.8.3 Genetic Algorithms.- 3.8.4 Growth and Death.- 4 Operation of PC Viruses.- 4.1 Introduction.- 4.2 PC Boot Sequence: Initialisation.- 4.3 BIOS and DOS.- 4.4 Master Boot Record.- 4.5 DOS Boot Sector.- 4.6 System Initialisation.- 4.7 Batch Processing Viruses.- 4.8 COM and EXE Viruses.- 4.8.1 Non-overwriting Prepending COM Infectors.- 4.8.2 Overwriting COM Infectors.- 4.8.3 Non-overwriting Appending COM Infectors.- 4.8.4 EXE Viruses.- 4.9 Resident and Transient Viruses.- 4.10 Manipulation by Viral Code.- 4.11 Activation Criteria.- 4.12 Camouflage.- 4.12.1 Concealment in Infected Files.- 4.12.2 Encryption of Viral Code.- 4.12.3 Hiding of Viral Code.- 4.12.4 Checksum Calculation.- 4.12.5 Prevention of Alteration Detection.- 4.12.6 Concealment of Viral Code in Memory.- 4.12.7 Concealment of Viral Activity.- 4.12.8 Concealing Disk Activity.- 4.12.9 Concealing System Slowdown.- 4.13 Replication.- 4.13.1 Locating a Host.- 4.13.2 Signatures.- 4.13.3 Miscellaneous Topics.- 4.13.3.1 Corresponding File Virus.- 4.13.3.2 SYS Virus.- 4.13.3.3 Multi-vector Viruses.- 4.13.3.4 Multi-architecture Viruses.- 4.13.3.5 Architecture Dependent Viruses.- 5 Management of PC Viruses.- 5.1 Perspective on Security.- 5.2 Components of a Virus Control Scheme.- 5.3 Prevention of Virus Attack.- 5.3.1 Physical Access Constraints.- 5.3.2 Electronic Measures.- 5.3.2.1 Physical Feature Verification.- 5.3.2.2 Knowledge Verification.- 5.3.2.2.1 Passwords.- 5.3.2.2.2 Background Verification.- 5.3.2.2.3 Other Techniques.- 5.3.2.3 Possession Verification.- 5.3.3 Media Access Controls.- 5.3.4 Network Access Controls.- 5.3.4.1 Identification of Access Controls.- 5.3.4.1.1 Centralised Network File Servers.- 5.3.4.1.2 Distributed Trust.- 5.3.4.1.3 Network Transport by Public Carrier or Accessible Media.- 5.3.5 Ideological Controls.- 5.3.5.1 User Education.- 5.3.6 Management Policies.- 5.3.6.1 Training of Employees.- 5.3.6.2 Use of Anti-viral Measures.- 5.3.6.3 Compartmentalisation.- 5.3.6.4 Centralisation.- 5.3.6.5 Personnel Policies.- 5.3.7 Vaccination and Inoculation.- 5.4 Detection of Viral Code.- 5.4.1 Monitoring and Logging.- 5.4.2 Signature Recognition.- 5.4.3 Generic Code Recognition.- 5.4.4 Sacrificial Lamb.- 5.4.5 Auditing.- 5.4.6 Use of Expert Systems to Analyse Viral Behaviour.- 5.4.7 Fighting Fire with Fire.- 5.5 Containment of Viral Code.- 5.5.1 Hardware Compartmentalisation.- 5.5.1.1 Virtual Machine.- 5.5.1.1.1 80386 Task Switching Support.- 5.5.1.1.2 80386 Paged Segmented Memory.- 5.5.1.1.3 Accessing OS Code.- 5.5.1.1.4 Segment Permissions.- 5.5.1.1.5 Paged Memory Operation.- 5.5.1.1.6 Input/Output Operations.- 5.5.1.1.7 Virtual Machine in Software.- 5.5.1.2 Automatic Flow Verification.- 5.5.1.3 Software Distribution: Ensuring Trust.- 5.5.2 Software Compartmentalisation.- 5.5.2.1 Interrupt Trapping Code.- 5.5.2.1.1 Configurable Monitors.- 5.5.2.1.2 Operation of a Monitor.- 5.5.2.1.3 Extensions to Real Time Monitoring.- 5.5.2.2 OS Support.- 5.5.3 Network Compartmentalisation.- 5.5.4 Investigation and Response.- 5.5.4.1 What is the Infection?.- 5.5.4.1.1 Acquisition.- 5.5.4.1.2 Logging of Relevant Information.- 5.5.4.1.3 Disassembly.- 5.5.4.2 Dissemination of Information.- 5.5.4.3 General Containment.- 5.5.4.4 Tracing of Infection Source.- 5.5.5 Disinfection of Viral Code.- 5.5.5.1 Re-installation.- 5.5.5.2 Recompilation from Source.- 5.5.6 Checking for Re-infection.- 5.5.7 Disinfection Utilities.- 5.6 Recovery from Viral Infection.- 5.6.1 Backup Procedures.- 5.7 Contingency Planning.- 5.7.1 Redundancy.- 5.7.2 Insurance.- 5.7.3 Public Relations.- 5.8 Remedial Action.- 6 Apple Macintosh Viruses.- 6.1 Introduction.- 6.2 Macintosh: The Abstract Operating System.- 6.2.1 Initialisation.- 6.2.2 Resources.- 6.2.3 Trap Dispatch Table Structure.- 6.2.4 Non-link Viruses.- 6.2.5 Link Viruses.- 6.2.6 Notes on Keyboard Sequences.- 6.2.7 Summary of Mac Protection.- 7 Mainframe Systems: The Growing Threat.- 7.1 Introduction.- 7.2 Hardware Architectures.- 7.3 Software Architecture.- 7.3.1 Discretionary Access Controls.- 7.3.2 Integrity versus Confidentiality.- 7.3.3 Mandatory Access Controls.- 7.3.4 Commentary on Security Standardisation.- 7.4 UNIX: A Viral Risk Assessment.- 7.4.1 System Startup.- 7.4.2 Login and User Commands.- 7.4.3 Bugs and Loopholes.- 7.4.4 Mechanics of UNIX Viruses.- 7.4.4.1 Batch Viruses.- 7.4.4.2 Link Viruses.- 7.4.4.3 Dynamic Loading.- 7.4.4.4 Other Considerations.- 7.4.4.5 Protecting Against UNIX Viruses.- 7.4.4.6 Cohen: Early UNIX Viruses.- 8 Network Viruses: The Worms.- 8.1 Introduction.- 8.2 Standardisation.- 8.3 History of Network Pests.- 8.3.1 Early Work: Pre-1980.- 8.3.2 Recent Benign and Malicious Worms.- 8.3.3 CHRISTMA EXEC Chain Letter.- 8.3.4 Chain Letters on UNIX.- 8.4 Internet Protocols.- 8.4.1 Architecture.- 8.4.2 Peer Authentication.- 8.4.3 Access Controls.- 8.4.4 Data Stream Integrity.- 8.4.5 Daemons and Servers.- 8.4.6 Distributed Trust.- 8.4.7 Trusted Ports.- 8.4.8 Problems and Solutions.- 8.4.9 Internet Worm: Black Thursday — 3 November 1988.- 8.4.9.1 Internals.- 8.4.9.2 Action and Reaction.- 8.4.9.3 The Aftermath.- 8.4.10 DISNET: A Child of the Internet.- 8.5 OSI: Security in the Making.- 8.6 DECNET: Insecurity Through Default.- 8.6.1 HI.COM: The Christmas Worm.- 8.6.1.1 Reaction of the DECNET Community.- 8.6.1.2 Worms Against Nuclear Killers.- 9 Reactions of the IT Community.- 9.1 Discussion and Advice.- 9.1.1 Bulletin Board and Casual Users.- 9.1.2 Academic Establishments.- 9.1.2.1 CREN/CSNET.- 9.1.2.2 NSFNET.- 9.1.2.3 HEPNET/SPAN.- 9.1.2.4 General Community Responses.- 9.1.3 Government Research Organisations.- 9.1.4 Military Organisations.- 9.1.5 Commercial Organisations.- 9.1.6 Criminal Investigation Organisations.- 9.1.7 Professional Organisations.- 9.2 Legislative Issues.- 9.2.1 Scottish Law Commission.- 9.2.2 English Law Commission.- 9.2.3 Computer Misuse Act.- 9.2.4 Summary of Legislation.- 9.3 Professionalism and Software Development.- 10 Conclusions: The Future Ahead.- Appendices.- 1 DOS Filestore Structure.- 1.1 Introduction.- 1.2 Master Boot Record.- 1.3 DOS Boot Sector.- 1.4 File Allocation Table.- 1.5 Root Directory.- 2 Low Level Disk Layout.- 3 EXE File Format.- 4 Mac Filestore Structure.- 5 PC Virus Relationship Chart.- 6 Macintosh Virus Relationship Chart.- 7 PC Boot Sequence.- 8 AIDS Trojan: Accompanying Licence.- 9 Software Infected at Source.- 10 Nomenclature.- 10.1 Types of Virus.- 10.1.1 Master Boot Sector Viruses.- 10.1.2 DOS Boot Sector Viruses.- 10.1.3 Executable COM/EXE Viruses.- 10.1.4 Memory Resident Viruses.- 10.1.5 Overwriting Viruses.- 10.1.6 Prepending Viruses.- 10.1.7 Appending Viruses.- 10.2 Generations of Virus.- 10.3 Classes of Anti-virus Product.- 11 UNIX Boot Sequence.- 12 CERT Press Release.- 13 CERT/CIAC Advisories.- 14 Contact Points.- 15 Abbreviations.- 16 Further Reading.- 17 Virus-1 Archive Sites.- 18 Relative Frequencies of IBM Viruses.

    15 in stock

    £42.74

  • Information and the Internal Structure of the

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Information and the Internal Structure of the

    1 in stock

    Book SynopsisNot so if the book has been translated into Arabic. Now the reader can discern no meaning in the letters. The text conveys almost no information to the reader, yet the linguistic informa­ tion contained by the book is virtually the same as in the English original. The reader, familiar with books will still recognise two things, however: First, that the book is a book. Second, that the squiggles on the page represent a pattern of abstractions which probably makes sense to someone who understands the mean­ ing of those squiggles. Therefore, the book as such, will still have some meaning for the English reader, even if the content of the text has none. Let us go to a more extreme case. Not a book, but a stone, or a rock with engravings in an ancient language no longer under­ stood by anyone alive. Does such a stone not contain human information even if it is not decipherable? Suppose at some point in the future, basic knowledge about linguistics and clever computer aids allow us to decipher it? Or suppose someone discovers the equivalent of a Rosetta stone which allows us to translate it into a known language, and then into English? Can one really say that the stone contained no information prior to translation? It is possible to argue that the stone, prior to deciphering contained only latent information.Table of ContentsPrologue.- The Author’s Dilemma.- 1 Information: Abstraction or Reality?.- Can Information Exist Outside the Human Brain?.- Can Information be Processed Outside the Human Brain?.- Forms of Human Information and its Communication.- Biological Information Systems.- Inorganic Information Systems.- Non-human Information Processing.- Some Epistemological Considerations.- 2 Information Physics: An Introduction.- The Reality of Information.- The Heart of the Concept.- Information: The Hidden Dimension.- 3 Information and Entropy: The Mathematical Relationship.- Information and Organisation.- The Second Law of Thermodynamics.- The Boltzmann/Schrödinger Equation.- Information as an Inverse Exponential Function of Entropy.- The Constant c.- 4 Measuring the Information Changes of Altered Physical States.- Measuring the Information Content of a Crystal.- Proteins as Information Systems.- The Denaturation of Trypsin.- Concluding Remarks.- 5 Information and Entropy: Further Implications.- Information and Entropy as Viewed by the Communications Engineers.- Positive Entropy.- Negative Entropy.- Information Magnitudes.- The Evolution of the Universe.- 6 Some Further Considerations About the Interrelationship Between Information and Energy.- Pure Energy: Heat, the Antithesis of Information.- The Information Content of Energy.- Motion, Distance and Time.- Information and Potential Energy.- The Interconversion of Energy and Information.- Information Machines.- Structural vs Kinetic Information.- Transformations Between Kinetic and Structural Information.- 7 Information and Work.- The Relationship Between Work and Information.- Energy Transducers.- Work in Biological Systems.- Reassessing the Work Equations.- Measuring the Information Content of Electrical Work.- 8 Summary and Concluding Remarks.- The Basic Propositions.- Historical Perspective.- Why Has Information Been Overlooked?.- The Need for Models and Theories.- The Relevance of Information Physics for a General Theory of Information.- Some Concluding Thoughts.- Appendixes.- A. Speculations on Electromagnetic Radiation and Particles of Information.- B. Further Speculations: Implications for Atomic Structure.- C. A Smaller Universe.- D. Other Universes?.

    1 in stock

    £50.99

  • Funktionale Programmierung: Sprachdesign und

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Funktionale Programmierung: Sprachdesign und

    15 in stock

    Book SynopsisGegenstand dieses Werkes sind die Theorie und Praxis der modernen funktionalen Programmierung. Dabei betrachten die Autoren aber nicht nur das, was mittels der heute implementierten Sprachen wie HASKELL, OPAL, ML usw. machbar ist, sondern weisen auch auf aktuelle Entwicklungen hin. Zum einen werden fortgeschrittene Programmiertechniken vorgestellt, wie z.B. die Verwendung unendlicher Datenstrukturen, Parser als Funktionen höherer Ordnung, Approximations-Algorithmen, Lösung von Gleichungssystemen usw. Zum anderen werden aber auch Sprachkonzepte diskutiert, wie z.B. eine systematische Form der Modularisierung oder besonders ausdrucksstarke und flexible Formen der Typisierung. Ein besonderes Gewicht wird generell auf die Integration verschiedener Paradigmen gelegt, wie etwa die Verbindung mit Konzepten der objektorientierten, der nebenläufigen oder der Constraint-basierten Programmierung. In diesem Zusammenhang wird speziell auch die Bedeutung von Monaden analysiert und kritisch hinterfragt.Trade ReviewAus den Rezensionen: "Bei diesem Titel … werden … fortgeschrittene Leser angesprochen, die mit den Grundlagen der funktionalen Programmierung vertraut sind. … ‘Im Vordergrund stehen Ideen und Konzepte einer eleganten, sicheren und produktiven Form des Programmierens‘, wobei der Blick in die Zukunft gerichtet ist und Konzepte und Methoden vorgestellt werden, die erst in den Sprachen der nächsten Generation verfügbar sein werden. Geeignet für Bibliotheken … an Hochschulstandorten … Das Lehrbuch kann noch weiter genutzt werden." (Isigkeit, in: ekz-Informationsdienst, 2006)Table of ContentsElementare Funktionale Programmierung Eine Wiederholung.- Das Strittigste vorab: Notationen.- Grundlagen der Funktionalen Programmierung.- Faulheit währt unendlich.- Parser als Funktionen höherer Ordnung.- Strukturierung von Programmen.- Gruppen: Die Basis der Modularisierung.- Operatoren auf Gruppen (Morphismen).- Die Idee der Typisierung.- Typen.- Subtypen (Vererbung).- Polymorphe und abhängige Typen.- Spezifikationen und Typklassen: Wie Typen typisiert werden.- Beispiel: Berechnung von Fixpunkten.- Beispiel: Monaden.- Datenstrukturen.- Netter stack und böse Queue.- Compilertechniken für funktionale Datenstrukturen.- Funktionale Arrays und Numerische Mathematik.- Map: Wenn Funktionen zu Daten werden.- Beispiel: Synthese von Programmen.- Integration von Paradigmen.- Zeit und Zustand in der funktionalen Welt.- Objekte und Ein-/Ausgabe.- Agenten und Prozesse.- Graphische Schnittstellen (GUIs).- Massiv parallele Programme.- Integration von Konzepten anderer Programmierparadigmen.

    15 in stock

    £27.99

  • Model-Based Testing of Reactive Systems: Advanced Lectures

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Model-Based Testing of Reactive Systems: Advanced Lectures

    1 in stock

    Book SynopsisTesting is the primary hardware and software verification technique used by industry today. Usually, it is ad hoc, error prone, and very expensive. In recent years, however, many attempts have been made to develop more sophisticated formal testing methods. This coherent book provides an in-depth assessment of this emerging field, focusing on formal testing of reactive systems. This book is based on a seminar held in Dagstuhl Castle, Germany, in January 2004. It presents 19 carefully reviewed and revised lectures given at the seminar in a well-balanced way ensuring competent complementary coverage of all relevant aspects. An appendix provides a glossary for model-based testing and basics on finite state machines and on labelled transition systems. The lectures are presented in topical sections on testing of finite state machines, testing of labelled transition systems, model-based test case generation, tools and case studies, standardized test notation and execution architectures, and beyond testing.Table of ContentsTesting of Finite State Machines.- I. Testing of Finite State Machines.- 1 Homing and Synchronizing Sequences.- 2 State Identification.- 3 State Verification.- 4 Conformance Testing.- II. Testing of Labeled Transition Systems.- Testing of Labeled Transition Systems.- 5 Preorder Relations.- 6 Test Generation Algorithms Based on Preorder Relations.- 7 I/O-automata Based Testing.- 8 Test Derivation from Timed Automata.- 9 Testing Theory for Probabilistic Systems.- III. Model-Based Test Case Generation.- Model-Based Test Case Generation.- 10 Methodological Issues in Model-Based Testing.- 11 Evaluating Coverage Based Testing.- 12 Technology of Test-Case Generation.- 13 Real-Time and Hybrid Systems Testing.- IV. Tools and Case Studies.- Tools and Case Studies.- 14 Tools for Test Case Generation.- 15 Case Studies.- V. Standardized Test Notation and Execution Architecture.- Standardized Test Notation and Execution Architecture.- 16 TTCN-3.- 17 UML 2.0 Testing Profile.- VI. Beyond Testing.- Beyond Testing.- 18 Run-Time Verification.- 19 Model Checking.- VII. Appendices.- Appendices.- 20 Model-Based Testing – A Glossary.- 21 Finite State Machines.- 22 Labelled Transition Systems.

    1 in stock

    £42.74

  • Object-Oriented Programming in Oberon-2

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Object-Oriented Programming in Oberon-2

    15 in stock

    Book SynopsisWithout a doubt the idea of object-oriented programming has brought some motion into the field of programming methodology and enlarged the set of programming languages. Object-oriented programming is nothing new-it first arose in the sixties. The motivation came from the simulation of discrete event systems. The concept first manifested itself in the language Simula 67. It took nearly two decades for the method to gain impetus, and today object-oriented programming is an important concept and a powerful technique. Meanwhile, we can even speak of an over­ reaction, for the concept has become a buzzword. But buzzwords always appear where there is the hope of exploiting ill-informed clients because they see the new approach as the solution to all their problems. Thus object-oriented programming is often hailed as a panacea. And so the question is justified: What is really behind it? To let the cat out of the bag: There is more to object-oriented programming than merely putting data as objects in the fore­ ground, instead of algorithms to which the data are subject. It is more than purely an alternative view of programmed systems. To identify the essence of object-oriented programming, is the subject of this book. This is a textbook that shows in a didactically skillful way which concepts and constructs are new, where they can be employed reasonably, and what advantages they offer. For, not all programs are automatically improved by merely recasting them in an object-oriented style.Table of Contents1 Overview.- 1.1 Procedure-Oriented Thinking.- 1.2 Object-Oriented Thinking.- 1.3 Object-Oriented Languages.- 1.4 How OOP Differs from Conventional Programming.- 1.5 Classes as Abstraction Mechanisms.- 1.6 History of Object-Oriented Languages.- 1.7 Summary.- 2 Oberon-2.- 2.1 Features of Oberon-2.- 2.2 Declarations.- 2.3 Expressions.- 2.4 Statements.- 2.5 Procedures.- 2.6 Modules.- 2.7 Commands.- 3 Data Abstraction.- 3.1 Concrete Data Structures.- 3.2 Abstract Data Structures.- 3.3 Abstract Data Types.- 4 Classes.- 4.1 Methods.- 4.2 Classes and Modules.- 4.3 Examples.- 4.4 Common Questions.- 5 Inheritance.- 5.1 Type Extension.- 5.2 Compatibility of a Base Type and its Extension.- 5.3 Static and Dynamic Type.- 5.4 Run-Time Type Checking.- 5.5 Extensibility in an Object-Oriented Sense.- 5.6 Common Questions.- 6 Dynamic Binding.- 6.1 Messages.- 6.2 Abstract Classes.- 6.3 Examples.- 6.4 Message Records.- 6.5 Common Questions.- 7 Typical Applications.- 7.1 Abstract Data Types.- 7.2 Generic Components.- 7.3 Heterogeneous Data Structures.- 7.4 Replaceable Behavior.- 7.5 Adaptable Components.- 7.6 Semifinished Products.- 7.7 Summary.- 8 Useful Techniques.- 8.1 Initialization of Objects.- 8.2 Extending a System at Run Time.- 8.3 Persistent Objects.- 8.4 Wrapping Classes in Other Classes.- 8.5 Extensibility in Multiple Dimensions.- 8.6 Multiple Inheritance.- 8.7 Models and Views.- 8.8 Iterators.- 8.9 Modifying Inherited Methods.- 9 Object-Oriented Design.- 9.1 Functional Design.- 9.2 Object-Oriented Design.- 9.3 Identifying the Classes.- 9.4 Designing the Interface of a Class.- 9.5 Abstract Classes.- 9.6 Relationships between Classes.- 9.7 When to Use Classes.- 9.8 Common Design Errors.- 10 Frameworks.- 10.1 Subsystems and Frameworks.- 10.2 The MVC Framework.- 10.3 A Framework for Objects in Texts.- 10.4 Application Frameworks.- 11 Oberon0 — A Case Study.- 11.1 The Viewer System.- 11.2 Handling User Input.- 11.3 A Text Editor.- 11.4 A Graphics Editor.- 11.5 Embedding Graphics in Texts.- 12 Costs and Benefits of OOP.- 12.1 Benefits.- 12.2 Costs.- 12.3 The Future.- A Oberon-2 — Language Definition.- A.1 Introduction.- A.2 Syntax.- A.3 Vocabulary and Representation.- A.4 Declarations and Scope Rules.- A.5 Constant Declarations.- A.6 Type Declarations.- A.7 Variable Declarations.- A.8 Expressions.- A.9 Statements.- A.10 Procedure Declarations.- A.11 Modules.- A.12 Appendices to the Language Definition.- B The Module OS.- C The Module IO.- D How to Get Oberon.

    15 in stock

    £42.74

  • Coordination Technology for Collaborative

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Coordination Technology for Collaborative

    1 in stock

    Book SynopsisGiven the broad popularity of Internet technology, even in its present immature state, and also the recent progress made towards a human-centered view of information technology, the time now seems ripe to essentially extend the scope and power of enterprise information systems.This carefully arranged book concentrates on the relationships between coordination technology and business application requirements and introduces general elements of a cooperative infrastructure allowing for the construction of collaborative applications. It is essential reading for research and development professionals active in the area as well as for IT managers interested in applying this promising new technology in order to remain competitive in the future.Table of ContentsA perspective on technology-assisted collaboration.- Coordination in knowledge-intensive organizations.- Co-ordination of management activities — Mapping organisational structure to the decision structure.- A cooperative approach to distributed applications engineering.- Towards logic programming based coordination in virtual worlds.- Enhancement of creative aspects of a daily conversation with a topic development agent.- Coordinating human and computer agents.- Coordination in workflow management systems — A rule-based approach.- A framework and mathematical model for collaboration technology.- Practical experiences and requirements on workflow.- Coordination science: Challenges and directions.- Supporting autonomous work and reintegration in collaborative systems.- Workspace awareness for distributed teams.- GeM and WeBUSE: Towards a WWW-database interface.- Post-client/server coordination tools.- An experimental delay analysis for local audio video streams for desktop collaborations.- Supporting both client-server and peer-to-peer models in a framework of a distributed object management system.

    1 in stock

    £40.49

  • Fundamental Approaches to Software Engineering: First International Conference, FASE'98, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Fundamental Approaches to Software Engineering: First International Conference, FASE'98, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS'98, Lisbon, Portugal, March 28 - April 4, 1998, Proceedings

    15 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the First International Conference on Fundamental Approaches to Software Engineering, FASE'98, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS'98, held in Lisbon, Portugal, in March/April 1998.Besides two invited presentations and three system demonstrations, this volume presents 18 revised full papers selected from a total of 59 submissions. Among the various fundamental software engineering issues addressed are formal methods, specification languages, refinement, object-oriented modeling, software architectures, statecharts, model checking, etc.Table of ContentsExtreme programming: A humanistic discipline of software development.- Some mistakes I have and what I have learned from them.- Specifying and analyzing dynamic software architectures.- Observational proofs with critical contexts.- Integrating AORTA with model-based data specification languages.- Specifying safety-critical embedded systems with statecharts and Z: A case study.- Specifying embedded systems with statecharts and Z: An agenda for cyclic software components.- Algebra transformation systems and their composition.- Navigation expressions in object-oriented modelling.- Compositional verification of reactive systems specified by graph transformation.- Reflections on the design of a specification language.- Constructs, concepts and criteria for reuse in concurrent object-oriented languages.- Backtracking-free design planning by automatic synthesis in metaframe.- Model-checking CSP-Z.- Rule-based refinement of high-level nets preserving safety properties.- Automated formal analysis of networks: FDR models of arbitrary topologies and flow-control mechanisms.- Behaviour analysis and safety conditions: A case study in CML.- Distributed safety controllers for web services.- A refinement calculus for statecharts.- Refining formal specifications of human computer interaction by graph rewrite rules.- RELVIEW — A system for calculating with relations and relational programming.- ALBERT: A formal language and its supporting tools for requirements engineering.- Moby/plc — A design tool for hierarchical real-time automata.

    15 in stock

    £42.74

  • Artificial Intelligence in Structural Engineering: Information Technology for Design, Collaboration, Maintenance, and Monitoring

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Artificial Intelligence in Structural Engineering: Information Technology for Design, Collaboration, Maintenance, and Monitoring

    15 in stock

    Book SynopsisThis book presents the state of the art of artificial intelligence techniques applied to structural engineering. The 28 revised full papers by leading scientists were solicited for presentation at a meeting held in Ascona, Switzerland, in July 1998.The recent advances in information technology, in particular decreasing hardware cost, Internet communication, faster computation, increased bandwidth, etc., allow for the application of new AI techniques to structural engineering. The papers presented deal with new aspects of information technology support for the design, analysis, monitoring, control and diagnosis of various structural engineering systems.Table of ContentsStructural monitoring of civil structures using vibration measurement Current practice and future.- Object-oriented software patterns for engineering design standards processing.- Design and verification of real-time systems.- Using knowledge nodes for knowledge discovery and collaboration.- Heating system design support.- Collaborative desktop engineering.- Towards personalized structural engineering tools.- Complex systems: Why do they need to evolve and how can evolution be supported.- Formalizing product model transformations: Case examples and applications.- Internet-based web-mediated collaborative design and learning environment.- Wearable computers for field inspectors: Delivering data and knowledge-based support in the field.- Conceptual designing as a sequence of situated acts.- Some personal experience in computer aided engineering research.- Knowledge discovery from multimedia case libraries.- Customisable knowledge bases for conceptual design.- Articulate design of free-form structures.- Applying quantitative constraint satisfaction in preliminary design.- Agents in computer-assisted collaborative design.- A collaborative negotiation methodology for large scale civil engineering and architectural projects.- An investigation into the integration of neural networks with the structured genetic algorithm to aid conceptual design.- Finding the right model for bridge diagnosis.- Knowledge-based assistants in collaborative engineering.- CAD modelling in multidisciplinary design domains.- A family of software components to deliver solutions for the interpretation of monitoring data.- AI methods in concurrent engineering.- A new collaborative design environment for engineers and architects.- Intelligent structures: A new direction in structural control.- Integration of expert systems in a structural design office.- Teaching knowledge engineering: Experiences.- Design support for viaducts.- Converting function into object.- Software agent techniques in design.- Case-based design process facilitating collaboration and information evolution.- Shared experiences: Management of experiential knowledge in the building industry.- Dam safety: Improving management.- Integrating virtual reality and telepresence to remotely monitor construction sites: A ViRTUE project.- Proposal for 4.5 dimensional design via product models and expert system.- A product information system based on dynamic classification.- Structural monitoring: Decision-support through multiple data interpretations.- Augmented reality applications to structural monitoring.- Analysis and design of the as-built model.- On theoretical backgrounds of CAD.

    15 in stock

    £42.74

  • Multi-Agent System Engineering: 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World, MAAMAW'99 Valencia, Spain, June 30 - July 2, 1999 Proceedings

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Multi-Agent System Engineering: 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World, MAAMAW'99 Valencia, Spain, June 30 - July 2, 1999 Proceedings

    1 in stock

    Book SynopsisIn the ten years since the first MAAMAW was held in 1989, at King's College, Cambridge, the field of Multi-Agent Systems (MAS) has flourished. It has attracted an increasing amount of theoretical and applied research. During this decade, important efforts have been made to establish the scientific and technical foundations of MAS. MAAMAW publications are testimony to the progress achieved in key areas such as agent modelling and reasoning, multi-agent interaction and communication, and multi-agent organisation and social structure. Research results have covered a wide range of inter-related topics in each area including agent architectures, reasoning models, logics, conflict resolution, negotiation, resource allocation, load balancing, learning; social behaviour and interaction, languages and protocols, interagent and agent-human communication, social models, agent roles, norms and social laws, and static and dynamic organisational structures. The feasibility and the viability of the proposed models and techniques have been demonstrated through MAS applications in heterogeneous domains including electronic commerce, co-operative work, telecommunications, social and biological systems, robotics, office and business automation, public administration, social simulations and banking. As the applicability of the technology became understood, the multi-agent paradigm has been progressively accepted by product managers and system developers, giving rise to a considerable amount of business expectation from industry. These expectations do not rest on the concept or metaphor of agent, but on the development of MAS useful in an industrial setting, with real-time systems presenting the biggest challenge.Table of ContentsEngineering Aspects of Multi-agent Systems.- Agent-Oriented Software Engineering.- Specification of Bahavioural Requirements within Compositional Multi-agent System Design.- Agent-Oriented Design.- A Developer’s Perspective on Multi-agent System Design.- Multi-agent Systems Framework.- A Development Environment for the Realization of Open and Scalable Multi-agent Systems.- Modelling Agents in Hard Real-Time Environments.- Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology.- Languages and Protocols.- Protocol Engineering for Multi-agent Interaction.- Designing Agent Communication Languages for Multi-agent Systems.- A Temporal Agent Communication Language for Dynamic Multi-agent Systems.- Multi-paradigm Languages Supporting Multi-agent Development.- Negotiation and Cooperation.- An Efficient Argumentation Framework for Negotiating Autonomous Agents.- Negotiating Service Provisioning.- Cooperative Plan Selection Through Trust.- Extending Social Reasoning to Cope with Multiple Partner Coalitions.- Formal Models.- Basic Mental Attitudes of a Collaborating Agent: Cognitive Primitives for MAS.- Subjective Situations.- Formal Analysis of Models for the Dynamics of Trust Based on Experiences.

    1 in stock

    £40.49

  • Algorithmic Adventures: From Knowledge to Magic

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Algorithmic Adventures: From Knowledge to Magic

    15 in stock

    Book SynopsisThe ?rst and foremost goal of this lecture series was to show the beauty, depth and usefulness of the key ideas in computer science. While working on the lecture notes, we came to understand that one can recognize the true spirit of a scienti?c discipline only by viewing its contributions in the framework of science as a whole. We present computer science here as a fundamental science that, interacting with other scienti?c disciplines, changed and changes our view on the world, that contributes to our understanding of the fundamental concepts of science and that sheds new light on and brings new meaning to several of these concepts. We show that computer science is a discipline that discovers spectacular, unexpected facts, that ?nds ways out in seemingly unsolvable s- uations, and that can do true wonders. The message of this book is that computer science is a fascinating research area with a big impact on the real world, full of spectacular ideas and great ch- lenges. It is an integral part of science and engineering with an above-average dynamic over the last 30 years and a high degree of interdisciplinarity. The goal of this book is not typical for popular science writing, whichoftenrestrictsitselftooutliningtheimportanceofaresearch area. Whenever possible we strive to bring full understanding of the concepts and results presented.Trade ReviewFrom the reviews: "A lucid exposition of fundamental ideas, concepts and methods of computer science, their essence and their limits, delightfully represented, and easily understandable for a broad readership. Scientific writing at its best." (Peter Widmayer, ETH Zürich)“This book originated from a series of lectures given by the author to describe what computer science is and what its principle Ideas are. Algorithms are the key concept of this book. … The inclusion of problems makes the book more than a personal reflection. The style is lively and avoids unnecessary jargon. With a good teacher, it could be suitable as a textbook on the foundations of computer science in an undergraduate classroom.” (Anthony J. Duben, ACM Computing Reviews, February, 2010)“This is a very readable book on theoretical computer science, written for nonspecialists. … Practical applications are illustrated by examples from DNA computing and quantum mechanics. … Summing Up: Recommended. Lower- and upper-division undergraduates and general readers.” (M. Bona, Choice, Vol. 47 (5), January, 2010)“The author is an acclaimed computer scientist and he proves why: apart from being an aggressive researcher, he is also an excellent teacher. Using his ability to teach complex computing topics in an interesting way, he introduces to the reader the ‘power and the magic’ of the underlying principles. … It will certainly draw interest from both undergraduate and post-graduate students of computing and allied fields. … I do recommend this beautiful book for a scientific library … .” (Soubhik Chakraborty, ACM Computing Reviews, August, 2010)Table of ContentsThe Development of Computer Science: Not Just a Driving Licence.- Algorithmics: What Programming and Baking Have in Common.- Infinity Is Not Infinity: Why Infinity Is Infinitely Important in Computer Science.- The Limits of Computability: Why There Exist Tasks That Cannot Be Automatically Solved Using Computers.- Complexity Theory: What to Do When the Energy of the Universe Isn't Enough to Perform a Computation.- Randomness in Nature: A Source of Efficiency in Algorithmics.- Cryptography: How to Transform Drawbacks into Advantages.- Computing Using DNA Molecules: A Biological Computer on the Horizon.- Quantum Computers: Computing in the Wonderland of Particles.- How to Make a Good Decision for an Unknown Future: How to Foil an Adversary

    15 in stock

    £42.74

  • Touch of Class: Learning to Program Well with

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Touch of Class: Learning to Program Well with

    Out of stock

    Book SynopsisFrom object technology pioneer and ETH Zurich professor Bertrand Meyer, winner of the Jolt award and the ACM Software System Award, a revolutionary textbook that makes learning programming fun and rewarding. Meyer builds his presentation on a rich object-oriented software system supporting graphics and multimedia, which students can use to produce impressive applications from day one, then understand inside out as they learn new programming techniques. Unique to Touch of Class is a combination of a practical, hands-on approach to programming with the introduction of sound theoretical support focused on helping students learn the construction of high quality software. The use of full color brings exciting programming concepts to life. Among the useful features of the book is the use of Design by Contract, critical to software quality and providing a gentle introduction to formal methods. Will give students a major advantage by teaching professional-level techniques in a literate, relaxed and humorous way.Trade ReviewFrom the reviews:“This book ‘is not just about learning to program but about ’Learning to program Well.’’ Meyer’s latest text conveys his impressive experience in the field of computer science, going well beyond just software engineering. … the target audience includes both students and teachers. …The large quantity of information provided is well organized. … Colors are plentiful and character fonts play an important role. …Coming from a father of object orientation and software quality, it is not surprising that this is an excellent book.” (Alexandre Bergel, ACM Computing Reviews, January, 2010)“The best thing about this book, and it is a very good thing indeed, is that it is thorough. … The material is well-written and thorough – it includes introductory material aimed at the student, then at the instructor. … this is an excellent book. If I were put in the position of needing to teach an elementary programming course … this would be high on my list of candidate textbooks.” (Robert L. Glass, The Software Practitioner, January-February, 2010)“This nicely written and enjoyable textbook is used for the ‘Introduction to programming’ course taught at ETH (Eidgenössische Technische Hochschule Zürich) to all entering computing science students. … In addition to the excellent book, Meyer provides an outstanding web site (http://touch.ethz.ch/) with a huge amount of material including course slides, video recording of lectures, slides for exercise sessions, a lot of information for instructors, software downloads, and, of course, blogs and wikis.” (Haim Kilov, Zentralblatt MATH, Vol. 1188, 2010)"Touch of Class: Learning to Program Well with Objects and Contracts" (ToC) is an excellent book to read. (…) Instead of teaching a whole lot of details from the bottom up, it explains from the top, giving the whole picture, why things are done and then down to the details of how they are done. Meyer also calls this outside-in. You can see the whole at once and then explain the details. This is how programming should be — using broad concepts, rather than narrow implementation details. ( Ian Joyner on https://siliconvalleyhype.quora.com/, Jan 2022).Table of ContentsBasics.- The industry of pure ideas.- Dealing with objects.- Program structure basics.- The interface of a class.- Just Enough Logic.- Creating objects and executing systems.- Control structures.- Routines, functional abstraction and information hiding.- Variables, assignment and references.- How things work.- Just enough hardware.- Describing syntax.- Programming languages and tools.- Algorithms and data structures.- Fundamental data structures, genericity, and algorithm complexity.- Recursion and trees.- Devising and engineering an algorithm: Topological Sort.- Object-Oriented Techniques.- Inheritance.- Operations as objects: agents and lambda calculus.- Event-driven design.- Towards software engineering.- to software engineering.

    Out of stock

    £46.74

  • Secure Systems Development with UML

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Secure Systems Development with UML

    15 in stock

    Book SynopsisAttacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to developers who are not specialists in security. As one example, Jürjens uncovers a flaw in the Common Electronic Purse Specification, and proposes and verifies a correction. With a clear separation between the general description of his approach and its mathematical foundations, the book is ideally suited both for researchers and graduate students in UML or formal methods and security, and for advanced professionals writing critical applications.Table of ContentsPrologue.- Walk-through: Using UML for Security.- Background.- Developing Secure Systems.- Model-based Security Engineering with UML.- Applications.- Tool Support.- Tool support for UMLsec.- A Formal Foundation.- Formal Systems Development with UML.- Epilogue.- Further Material.- Outlook.

    15 in stock

    £94.99

  • Software Product Line Engineering: Foundations, Principles and Techniques

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Software Product Line Engineering: Foundations, Principles and Techniques

    1 in stock

    Book SynopsisSoftware product line engineering has proven to be the methodology for developing a diversity of software products and software intensive systems at lower costs, in shorter time, and with higher quality. In this book, Pohl and his co-authors present a framework for software product line engineering which they have developed based on their academic as well as industrial experience gained in projects over the last eight years. They do not only detail the technical aspect of the development, but also an integrated view of the business, organisation and process aspects are given. In addition, they explicitly point out the key differences of software product line engineering compared to traditional single software system development, as the need for two distinct development processes for domain and application engineering respectively, or the need to define and manage variability. Table of ContentsPart I Introduction Introduction to Software Product Line Engineering. - A Framework for Software Product Line Engineering. - Overview on the Example Domain: Home Automation Part II Variability Principles of Variability. - Documenting Variability in Requirements. - Documenting Variability in Design. - Documenting Variability in Realisation Part III Domain Engineering Product Management. - Domain Requirements Engineering. - Domain Design. - Domain Realisation. - Domain Testing. - Using COTS Components as Domain Artefacts Part IV Application Engineering Application Requirements Engineering. - Application Design. - Application Realisation. - Application Testing Part V Organisation Aspects Organisation. - Transition Process Part VI Experiences Experiences with Software Product Lines Appendix

    1 in stock

    £44.99

  • Software Process Improvement: Results and

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Software Process Improvement: Results and

    3 in stock

    Book SynopsisFor over a decade, software process improvement (SPI) has been promoted as an approach to improve systematically the way software is developed and managed. Mostly this research and the relevant experience reports have focused on large software companies. This book collects the main results from four Norwegian industrial research and development projects on SPI carried out between 1996 and 2005. It concentrates on small and medium-sized companies, typically characterized by fast-changing environments.Trade ReviewFrom the reviews: "The continuous improvement of software processes has been a managerial focus for several decades. This book, written by Norwegian academics, ‘mainly targets researchers and graduate students in empirical software engineering.’ … The papers are varied and well written … . Academics in both information technology and software engineering will find a basis for further research projects in this title." (David Bellin, Computing Reviews, December, 2006)Table of ContentsSoftware Process Improvement – General Principles and Methods.- Lessons Learned and Recommendations from Two Large Norwegian SPI Programmes.- Improvisation in Small Software Organizations.- An Empirical Investigation of the Key Factors for Success in Software Process Improvement.- Evidence-Based Software Engineering for Practitioners.- Challenges and Recommendations when Increasing the Realism of Controlled Software Engineering Experiments.- Knowledge Management for SPI.- Postmortem Reviews: Purpose and Approaches in Software Engineering.- Value-Based Knowledge Management – the Contribution of Postmortem Reviews and Process Workshops.- A Dynamic Model of Software Engineering Knowledge Creation.- An Empirical Study of an Informal Knowledge Repository in a Medium-Sized Software Consulting Company.- An Empirical Study on the Utility of Formal Routines to Transfer Knowledge and Experience.- Process Modelling and Electronic Process Guides.- Tailoring RUP to a Defined Project Type: A Case Study.- A Workshop-Oriented Approach for Defining Electronic Process Guides – A Case Study.- Empirical Investigation on Factors Affecting Software Developer Acceptance and Utilization of Electronic Process Guides.- Six Theses on Software Process Research.- Estimation Methods.- A Review of Studies on Expert Estimation of Software Development Effort.- Reuse of Software Development Experiences – A Case Study.- Effort Estimation of Use Cases for Incremental Large-Scale Software Development.- Empirical Studies in OO and Component-based Systems.- Experiences from Introducing UML-based Development in a Large Safety-Critical Project.- An Empirical Study on Off-the-Shelf Component Usage in Industrial Projects.- Evaluating the Effect of a Delegated versus Centralized Control Style on the Maintainability of Object-Oriented Software.

    3 in stock

    £118.35

  • Multimedia Systems

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Multimedia Systems

    1 in stock

    Book SynopsisMultimedia Systems discusses the basic characteristics of multimedia operating systems, networking and communication, and multimedia middleware systems. The overall goal of the book is to provide a broad understanding of multimedia systems and applications in an integrated manner: a multimedia application and its user interface must be developed in an integrated fashion with underlying multimedia middleware, operating systems, networks, security, and multimedia devices. Fundamental characteristics of multimedia operating and distributed communication systems are presented, especially scheduling algorithms and other OS supporting approaches for multimedia applications with soft-real-time deadlines, multimedia file systems and servers with their decision algorithms for data placement, scheduling and buffer management, multimedia communication, transport, and streaming protocols, services with their error control, congestion control and other Quality of Service aware and adaptive algorithms, synchronization services with their skew control methods, and group communication with their group coordinating algorithms and other distributed services. Table of Contents1 Introduction.- 2 Quality of Service.- 3 Multimedia Operating Systems.- 4 Media Server.- 5 Networks.- 6 Communication.- 7 Group Communication.- 8 Synchronization.

    1 in stock

    £40.49

  • Generative and Transformational Techniques in Software Engineering III: International Summer School, GTTSE 2009, Braga, Portugal, July 6-11, 2009, Revised Papers

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Generative and Transformational Techniques in Software Engineering III: International Summer School, GTTSE 2009, Braga, Portugal, July 6-11, 2009, Revised Papers

    1 in stock

    Book SynopsisThis tutorial book presents revised and extended lecture notes for a selection of the contributions presented at the International Summer School on Generative and Transformational Techniques in Software Engineering (GTTSE 2009), which was held in Braga, Portugal, in July 2009. The 16 articles comprise 7 long tutorials, 6 short tutorials and 3 participants contributions; they shed light on the generation and transformation of programs, data, models, metamodels, documentation, and entire software systems. The topics covered include software reverse and re-engineering, model driven engineering, automated software engineering, generic language technology, and software language engineering.Table of ContentsAn Introduction to Software Product Line Refactoring.- Excerpts from the TXL Cookbook.- Model Synchronization: Mappings, Tiles, and Categories.- An Introductory Tutorial on JastAdd Attribute Grammars.- Model Driven Language Engineering with Kermeta; EASY Meta-programming with Rascal.- The Theory and Practice of Modeling Language Design for Model-Based Software Engineering—A Personal Perspective.- Code Transformations for Embedded Reconfigurable Computing Architectures.- Model Transformation Chains and Model Management for End-to-End Performance Decision Support; Building Code Generators with Genesys: A Tutorial Introduction; The Need for Early Aspects.- Lightweight Language Processing in Kiama .- Some Issues in the ‘Archaeology’ of Software Evolution; Teaching Computer Language Handling – From Compiler Theory to Meta-modelling; C++ Metastring Library and Its Applications.- Language Convergence Infrastructure.

    1 in stock

    £40.49

  • Computer Aided Verification: 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011, Proceedings

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Computer Aided Verification: 23rd International Conference, CAV 2011, Snowbird, UT, USA, July 14-20, 2011, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 23rd International Conference on Computer Aided Verification, CAV 2011, held in Snowbird, UT, USA, in July 2011. The 35 revised full papers presented together with 20 tool papers were carefully reviewed and selected from 161 submissions. The papers are organized in topical sections on the following workshops: 4th International Workshop on Numerical Software Verification (NSV 2011), 10th International Workshop on Parallel and Distributed Methods in Verifications (PDMC 2011), 4th International Workshop on Exploiting Concurrency Efficiently and Correctly (EC2 2011), Frontiers in Analog Circuit Synthesis and Verification (FAC 2011), International Workshop on Satisfiability Modulo Theories, including SMTCOMP (SMT 2011), 18th International SPIN Workshop on Model Checking of Software (SPIN 2011), Formal Methods for Robotics and Automation (FM-R 2011), and Practical Synthesis for Concurrent Systems (PSY 2011).

    1 in stock

    £42.74

  • Evaluation of Novel Approaches to Software

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Evaluation of Novel Approaches to Software

    Out of stock

    Book SynopsisThis book contains a collection of thoroughly refereed papers presented at the 5th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2010, held in Athens, Greece, in July 2010. The 19 revised and extended full papers were carefully selected from 70 submissions. They cover a wide range of topics, such as quality and metrics; service and Web engineering; process engineering; patterns, reuse and open source; process improvement; aspect-oriented engineering; and requirements engineering.

    Out of stock

    £44.99

  • Software-Qualität

    Springer Fachmedien Wiesbaden Software-Qualität

    1 in stock

    Book SynopsisComputerabstürze, Rückrufaktionen, Sicherheitslecks: Das Phänomen Software- Fehler hat sich zum festen Bestandteil unseres täglichen Lebens entwickelt. Mit dem unaufhaltsamen Vordringen der Computertechnik in immer mehr sicherheitskritische Bereiche wird die Software-Qualitätssicherung zu einer stetig wichtiger werdenden Disziplin der Informationstechnik. Aber warum ist die Qualität von Software heute so schlecht? Und viel wichtiger noch: Stehen wir der Misere hilflos gegenüber? Dieses Buch führt umfassend und praxisnah in das Gebiet der Software- Qualitätssicherung ein und gibt eine Antwort auf die oben gestellten Fragen. Zu Beginn werden die typischen Fehlerquellen der Programmentwicklung erörtert und anschließend die verschiedenen Methoden und Techniken behandelt, die uns zur Verbesserung der Qualität zur Verfügung stehen. Behandelt werden die zentralen Themenkomplexe aus den Gebieten der konstruktiven und analytischen Qualitätssicherung, der Software-Infrastruktur und der Managementprozesse. Die 2. Auflage wurde durchgehend aktualisiert und korrigiert.Table of ContentsEinführung.- Software-Fehler.- Konstruktive Qualitätssicherung.- Sofware-Test.- Statische Code-Analyse.- Software-Verifikation.- Software-Lebenszyklus.- Software-Infrastruktur.- Managementprozesse.-Literaturverzeichnis.- Sachverzeichnis.

    1 in stock

    £37.99

  • Situational Method Engineering

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Situational Method Engineering

    15 in stock

    Book SynopsisWhile previously available methodologies for software – like those published in the early days of object technology – claimed to be appropriate for every conceivable project, situational method engineering (SME) acknowledges that most projects typically have individual characteristics and situations. Thus, finding the most effective methodology for a particular project needs specific tailoring to that situation. Such a tailored software development methodology needs to take into account all the bits and pieces needed for an organization to develop software, including the software process, the input and output work products, the people involved, the languages used to describe requirements, design, code, and eventually also measures of success or failure.The authors have structured the book into three parts. Part I deals with all the basic concepts, terminology and overall ideas underpinning situational method engineering. As a summary of this part, they present a formal meta-model that enables readers to create their own quality methods and supporting tools. In Part II, they explain how to implement SME in practice, i.e., how to find method components and put them together and how to evaluate the resulting method. For illustration, they also include several industry case studies of customized or constructed processes, highlighting the impact that high-quality engineered methods can have on the success of an industrial software development. Finally, Part III summarizes some of the more recent and forward-looking ideas.This book presents the first summary of the state of the art for SME. For academics, it provides a comprehensive conceptual framework and discusses new research areas. For lecturers, thanks to its step-by-step explanations from basics to the customization and quality assessment of constructed methods, it serves as a solid basis for comprehensive courses on the topic. For industry methodologists, it offers a reference guide on features and technologies to consider when developing in-house software development methods or customising and adopting off-the-shelf ones.Trade Review"This book offers a comprehensive body of knowledge related to the Method Engineering discipline. It provides a summary and synthesis of all past efforts in this domain and clarifies the domain terminology. I suggest it to every researcher interested in the art of method design, not only in software engineering but also in other fields." Marko Bajec, University of Ljubljana, Slovenia"I am confident this text will prove an invaluable resource for those interested in improving the standard of software development and the resulting software applications." from the foreword by Mary O'Kane, NSW Chief Scientist & Engineer, Sydney, Australia"This book deftly balances the advantages of situational method engineering in terms of its practical application, underpinned by the solid theory from worldwide research. I heartily recommend it for both researchers and practitioners." from the foreword by Julian Edwards, Chief Operating Officer, Object Consulting, Sydney, AustraliaTable of ContentsPart I SME Basics.- Chapter 1 Introduction.- Chapter 2 Method chunks, method fragments and method components.- Chapter 3 Method Engineering as a Social Practice.- Chapter 4 Formal descriptions.- Part II Applying SME in Practice.- Chapter 5 Identification and construction of individual method chunks/fragments.- Chapter 6 Processes for creating a methodology from method parts.- Chapter 7 Tailoring a constructed method.- Chapter 8 Assessing quality.- Chapter 9 Examples of constructed processes.- Part III The Future of SME.- Chapter 10 Recent advances in SME.- Chapter 11 Final summary and future work.

    15 in stock

    £42.74

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account