Computer Systems: Theory, Technology, and Applications
Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in a...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer New York
2004
|
Ausgabe: | 1st ed. 2004 |
Schriftenreihe: | Monographs in Computer Science
|
Schlagworte: | |
Online-Zugang: | UBY01 URL des Eerstveröffentlichers |
Zusammenfassung: | Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a pioneer of computer systems research and a noted innovator in the crucial area of system security. Computer Systems: Theory, Technology, and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book assembles a collection of short articles showing the state-of-the-art in systems, from formal calculi to mobile devices, from operating systems to distributed computing and security—while also honoring Needham’s important contributions. Among the topics addressed: Access control, data integration, and their languages Clumps, clusters, and classification The economics of open systems The Needham – Schroeder authentication protocol Sentient computing A technology transfer retrospective Real time in a real operating system Application-private networks Technologies for portable computing An authorization model for web services Challenges for computing research Protocol analysis, composability, and computation This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field |
Beschreibung: | 1 Online-Ressource (XVII, 338 p. 67 illus) |
ISBN: | 9780387218212 |
DOI: | 10.1007/b97622 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064503 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2004 |||| o||u| ||||||eng d | ||
020 | |a 9780387218212 |9 978-0-387-21821-2 | ||
024 | 7 | |a 10.1007/b97622 |2 doi | |
035 | |a (ZDB-2-SCS)978-0-387-21821-2 | ||
035 | |a (OCoLC)835437968 | ||
035 | |a (DE-599)BVBBV047064503 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004.6 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
245 | 1 | 0 | |a Computer Systems |b Theory, Technology, and Applications |c edited by Andrew James Herbert, Karen I.B. Spaerck Jones |
250 | |a 1st ed. 2004 | ||
264 | 1 | |a New York, NY |b Springer New York |c 2004 | |
300 | |a 1 Online-Ressource (XVII, 338 p. 67 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Monographs in Computer Science | |
520 | |a Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a pioneer of computer systems research and a noted innovator in the crucial area of system security. Computer Systems: Theory, Technology, and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book assembles a collection of short articles showing the state-of-the-art in systems, from formal calculi to mobile devices, from operating systems to distributed computing and security—while also honoring Needham’s important contributions. Among the topics addressed: Access control, data integration, and their languages Clumps, clusters, and classification The economics of open systems The Needham – Schroeder authentication protocol Sentient computing A technology transfer retrospective Real time in a real operating system Application-private networks Technologies for portable computing An authorization model for web services Challenges for computing research Protocol analysis, composability, and computation This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field | ||
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Software Engineering/Programming and Operating Systems | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Programming Languages, Compilers, Interpreters | |
650 | 4 | |a Operating Systems | |
650 | 4 | |a Computer organization | |
650 | 4 | |a Computers | |
650 | 4 | |a Software engineering | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Programming languages (Electronic computers) | |
650 | 4 | |a Operating systems (Computers) | |
650 | 0 | 7 | |a Datenverarbeitungssystem |0 (DE-588)4125229-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssystem |0 (DE-588)4139375-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Anwendungssystem |0 (DE-588)4139375-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Datenverarbeitungssystem |0 (DE-588)4125229-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Herbert, Andrew James |4 edt | |
700 | 1 | |a Spaerck Jones, Karen I.B. |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475780758 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780387201702 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475780741 |
856 | 4 | 0 | |u https://doi.org/10.1007/b97622 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471615 | ||
966 | e | |u https://doi.org/10.1007/b97622 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062611038208 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Herbert, Andrew James Spaerck Jones, Karen I.B |
author2_role | edt edt |
author2_variant | a j h aj ajh j k i s jki jkis |
author_facet | Herbert, Andrew James Spaerck Jones, Karen I.B |
building | Verbundindex |
bvnumber | BV047064503 |
classification_rvk | ST 200 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-0-387-21821-2 (OCoLC)835437968 (DE-599)BVBBV047064503 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/b97622 |
edition | 1st ed. 2004 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04699nmm a2200781zc 4500</leader><controlfield tag="001">BV047064503</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387218212</subfield><subfield code="9">978-0-387-21821-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b97622</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-0-387-21821-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)835437968</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064503</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer Systems</subfield><subfield code="b">Theory, Technology, and Applications</subfield><subfield code="c">edited by Andrew James Herbert, Karen I.B. Spaerck Jones</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2004</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer New York</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 338 p. 67 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Monographs in Computer Science</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a pioneer of computer systems research and a noted innovator in the crucial area of system security. Computer Systems: Theory, Technology, and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book assembles a collection of short articles showing the state-of-the-art in systems, from formal calculi to mobile devices, from operating systems to distributed computing and security—while also honoring Needham’s important contributions. Among the topics addressed: Access control, data integration, and their languages Clumps, clusters, and classification The economics of open systems The Needham – Schroeder authentication protocol Sentient computing A technology transfer retrospective Real time in a real operating system Application-private networks Technologies for portable computing An authorization model for web services Challenges for computing research Protocol analysis, composability, and computation This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering/Programming and Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Languages, Compilers, Interpreters</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming languages (Electronic computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitungssystem</subfield><subfield code="0">(DE-588)4125229-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Anwendungssystem</subfield><subfield code="0">(DE-588)4139375-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datenverarbeitungssystem</subfield><subfield code="0">(DE-588)4125229-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Herbert, Andrew James</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Spaerck Jones, Karen I.B.</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475780758</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780387201702</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475780741</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b97622</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471615</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b97622</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV047064503 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9780387218212 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471615 |
oclc_num | 835437968 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XVII, 338 p. 67 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Springer New York |
record_format | marc |
series2 | Monographs in Computer Science |
spelling | Computer Systems Theory, Technology, and Applications edited by Andrew James Herbert, Karen I.B. Spaerck Jones 1st ed. 2004 New York, NY Springer New York 2004 1 Online-Ressource (XVII, 338 p. 67 illus) txt rdacontent c rdamedia cr rdacarrier Monographs in Computer Science Computer Systems: Theory, Technology, and Applications A Tribute to Roger Needham Computer systems form the core of computing, as their combinations of hardware and software components function together to help program developers and end-users achieve goals of managing and accessing information in all its forms. Roger Needham, in a distinguished career at Cambridge University and Microsoft Research, was a pioneer of computer systems research and a noted innovator in the crucial area of system security. Computer Systems: Theory, Technology, and Applications presents a comprehensive edited survey of all aspects of the subject, with original contributions by more than 40 international leaders in the field. The book assembles a collection of short articles showing the state-of-the-art in systems, from formal calculi to mobile devices, from operating systems to distributed computing and security—while also honoring Needham’s important contributions. Among the topics addressed: Access control, data integration, and their languages Clumps, clusters, and classification The economics of open systems The Needham – Schroeder authentication protocol Sentient computing A technology transfer retrospective Real time in a real operating system Application-private networks Technologies for portable computing An authorization model for web services Challenges for computing research Protocol analysis, composability, and computation This accessible monograph is an ideal overview of theoretical and empirical evolution in computer systems. It will serve as an invaluable resource for professionals, researchers, libraries, and students who are interested in broadening their knowledge of the entire field Computer Systems Organization and Communication Networks Theory of Computation Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Languages, Compilers, Interpreters Operating Systems Computer organization Computers Software engineering Computer communication systems Programming languages (Electronic computers) Operating systems (Computers) Datenverarbeitungssystem (DE-588)4125229-9 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Anwendungssystem (DE-588)4139375-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Verteiltes System (DE-588)4238872-7 s DE-604 Anwendungssystem (DE-588)4139375-2 s Datenverarbeitungssystem (DE-588)4125229-9 s Computersicherheit (DE-588)4274324-2 s Rechnernetz (DE-588)4070085-9 s Herbert, Andrew James edt Spaerck Jones, Karen I.B. edt Erscheint auch als Druck-Ausgabe 9781475780758 Erscheint auch als Druck-Ausgabe 9780387201702 Erscheint auch als Druck-Ausgabe 9781475780741 https://doi.org/10.1007/b97622 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Computer Systems Theory, Technology, and Applications Computer Systems Organization and Communication Networks Theory of Computation Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Languages, Compilers, Interpreters Operating Systems Computer organization Computers Software engineering Computer communication systems Programming languages (Electronic computers) Operating systems (Computers) Datenverarbeitungssystem (DE-588)4125229-9 gnd Verteiltes System (DE-588)4238872-7 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anwendungssystem (DE-588)4139375-2 gnd |
subject_GND | (DE-588)4125229-9 (DE-588)4238872-7 (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4139375-2 (DE-588)1071861417 |
title | Computer Systems Theory, Technology, and Applications |
title_auth | Computer Systems Theory, Technology, and Applications |
title_exact_search | Computer Systems Theory, Technology, and Applications |
title_exact_search_txtP | Computer Systems Theory, Technology, and Applications |
title_full | Computer Systems Theory, Technology, and Applications edited by Andrew James Herbert, Karen I.B. Spaerck Jones |
title_fullStr | Computer Systems Theory, Technology, and Applications edited by Andrew James Herbert, Karen I.B. Spaerck Jones |
title_full_unstemmed | Computer Systems Theory, Technology, and Applications edited by Andrew James Herbert, Karen I.B. Spaerck Jones |
title_short | Computer Systems |
title_sort | computer systems theory technology and applications |
title_sub | Theory, Technology, and Applications |
topic | Computer Systems Organization and Communication Networks Theory of Computation Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Languages, Compilers, Interpreters Operating Systems Computer organization Computers Software engineering Computer communication systems Programming languages (Electronic computers) Operating systems (Computers) Datenverarbeitungssystem (DE-588)4125229-9 gnd Verteiltes System (DE-588)4238872-7 gnd Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anwendungssystem (DE-588)4139375-2 gnd |
topic_facet | Computer Systems Organization and Communication Networks Theory of Computation Software Engineering/Programming and Operating Systems Computer Communication Networks Programming Languages, Compilers, Interpreters Operating Systems Computer organization Computers Software engineering Computer communication systems Programming languages (Electronic computers) Operating systems (Computers) Datenverarbeitungssystem Verteiltes System Rechnernetz Computersicherheit Anwendungssystem Konferenzschrift |
url | https://doi.org/10.1007/b97622 |
work_keys_str_mv | AT herbertandrewjames computersystemstheorytechnologyandapplications AT spaerckjoneskarenib computersystemstheorytechnologyandapplications |