05557nam 2200649 450 99646609130331620211008135723.03-540-87698-710.1007/978-3-540-87698-4(CKB)1000000000490429(SSID)ssj0000316888(PQKBManifestationID)11258552(PQKBTitleCode)TC0000316888(PQKBWorkID)10286907(PQKB)11120417(DE-He213)978-3-540-87698-4(MiAaPQ)EBC3063204(MiAaPQ)EBC6511654(Au-PeEL)EBL6511654(OCoLC)277000986(PPN)129063010(EXLCZ)99100000000049042920211008d2008 uy 0engurnn|008mamaatxtccrComputer safety, reliability, and security 27th international conference, Safecomp 2008 Newcastle upon Tyne, UK, September 22-25, 2008 proceedings /Michael D. Harrison, Mark-Alexander Sujan (eds.)1st ed. 2008.Berlin, Germany ;New York, New York :Springer,[2008]©20081 online resource (XIV, 456 p.) Programming and Software Engineering ;5219Includes index.3-540-87697-9 Includes bibliographical references and index.Keynote Papers -- Critical Information Infrastructures: Should Models Represent Structures or Functions? -- Security and Interoperability for MANETs and a Fixed Core -- Technology, Society and Risk -- Panel: Complexity and Resilience -- Software Dependability -- The Effectiveness of T-Way Test Data Generation -- Towards Agile Engineering of High-Integrity Systems -- SafeSpection – A Systematic Customization Approach for Software Hazard Identification -- Integrating Safety Analyses and Component-Based Design -- Modelling Support for Design of Safety-Critical Automotive Embedded Systems -- Resilience -- Resilience in the Aviation System -- Resilience Markers for Safer Systems and Organisations -- Modeling and Analyzing Disaster Recovery Plans as Business Processes -- Fault Tolerance -- Analysis of Nested CRC with Additional Net Data in Communication -- Symbolic Reliability Analysis of Self-healing Networked Embedded Systems -- Investigation and Reduction of Fault Sensitivity in the FlexRay Communication Controller Registers -- Security -- Secure Interaction Models for the HealthAgents System -- Security Challenges in Adaptive e-Health Processes -- An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest -- Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles -- Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data -- Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures -- Safety Cases -- Constructing a Safety Case for Automatically Generated Code from Formal Program Verification Information -- Applying Safety Goals to a New Intensive Care Workstation System -- Safety Assurance Strategies for Autonomous Vehicles -- Expert Assessment of Arguments: A Method and Its Experimental Evaluation -- Formal Methods -- Formal Verification by Reverse Synthesis -- Deriving Safety Software Requirements from an AltaRica System Model -- Model-Based Implementation of Real-Time Systems -- Early Prototyping of Wireless Sensor Network Algorithms in PVS -- Dependability Modelling -- Analyzing Fault Susceptibility of ABS Microcontroller -- A Formal Approach for User Interaction Reconfiguration of Safety Critical Interactive Systems -- The Wrong Question to the Right People. A Critical View of Severity Classification Methods in ATM Experimental Projects -- Security and Dependability -- A Context-Aware Mandatory Access Control Model for Multilevel Security Environments -- Formal Security Analysis of Electronic Software Distribution Systems -- The Advanced Electric Power Grid: Complexity Reduction Techniques for Reliability Modeling -- Automating the Processes of Selecting an Appropriate Scheduling Algorithm and Configuring the Scheduler Implementation for Time-Triggered Embedded Systems.This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2008, held in Newcastle upon Tyne, UK, in September 2008. The 32 revised full papers presented together with 3 keynote papers and a panel session were carefully reviewed and selected from 115 submissions. The papers are organized in topical sections on software dependability, resilience, fault tolerance, security, safety cases, formal methods, dependability modelling, as well as security and dependability.Programming and Software Engineering ;5219Computer softwareReliabilityCongressesComputer securityComputer securityCongressesComputer softwareReliabilityComputer security.Computer security005.1Sujan Mark-AlexanderHarrison Michael DouglasInternational Conference on Computer Safety, Reliability, and SecurityMiAaPQMiAaPQMiAaPQBOOK996466091303316Computer Safety, Reliability, and Security2175020UNISA02845nam 2200613 a 450 991077971310332120230803021140.090-04-25270-310.1163/9789004252707(CKB)2550000001103105(EBL)1319102(OCoLC)854521063(SSID)ssj0000953431(PQKBManifestationID)11603834(PQKBTitleCode)TC0000953431(PQKBWorkID)10925762(PQKB)10672449(MiAaPQ)EBC1319102(nllekb)BRILL9789004252707(Au-PeEL)EBL1319102(CaPaEBR)ebr10735405(CaONFJC)MIL505611(EXLCZ)99255000000110310520130429d2013 uy 0engur|n|---|||||txtccrCrisis and continuity at the Abbasid court[electronic resource] formal and informal politics in the caliphate of al-Muqtadir (295-320/908-32) /by Maaike van Berkel ... [et al.]Leiden ;Boston Brill20131 online resource (276 p.)Islamic history and civilization. Studies and texts,0929-2403 ;v. 102Description based upon print version of record.90-04-25271-1 1-299-74360-9 Includes bibliographical references and index.pt. 1. Histories and stories -- pt. 2. Scribes and soldiers -- pt. 3. Women and courtiers.The reign of al-Muqtadir (295-320/908-32) is a crucial and controversial epoch in the history of the Abbasid empire. Al-Muqtadir’s regime has traditionally been depicted as one of decline, when the political power of the caliphate and the lustre of its capital began to crumble. This book not only offers a substantial investigation of the idea and reality of decline, but also provides new interpretations of the inner workings of the court and the empire. The authors, four specialists of Abbasid history, explore the formal and informal power relationships that shaped politics at the court, involving bureaucrats, military, harem, courtiers and of course al-Muqtadir himself. A study of the topography of Baghdad completes this vivid picture of the court and its capital.Islamic history and civilization ;v. 102.AbbasidsIslamic EmpireHistory750-1258Islamic EmpireCourt and courtiersAbbasids.909/.0976701Berkel Maaike van944912Berkel Maaike van944912MiAaPQMiAaPQMiAaPQBOOK9910779713103321Crisis and continuity at the Abbasid court3739287UNINA02077nas 2200529-a 450 99620032460331620240413013312.02054-9199(DE-599)ZDB2981300-1(CKB)1000000000262614(CONSER)---19017636-(EXLCZ)99100000000026261419801002b19041965 --- -engtxtrdacontentcrdamediacrrdacarrierThe numismatic chronicle and journal of the Royal Numismatic SocietyLondon B. Quaritch1904-1965London Royal Numismatic Society1 online resourceEdited by Sir J. Evans, 1904-1907; B.V. Head, 1904-1910; H.A. Grueber, 1904-1912; E.J. Rapson, 1904-1910; Oliver Codrington, 1911; G.F. Hill, 1912-1930; G.C. Brooke, 1913.Print version: The numismatic chronicle and journal of the Royal Numismatic Society. 0267-7504 (DLC) 19017636 (OCoLC)649406949 Proceedings of the Royal Numismatic Society form a separately paged section of each vol.NUMISMATIC CHRONICLENumismaticsPeriodicalsNumismaticsfast(OCoLC)fst01041327NumismaticsPeriodicalsnliPeriodicals.fastPeriodicals.lcgftNumismaticsNumismatics.Numismatics737.05Evans John1823-1908,Head Barclay V(Barclay Vincent),1844-1914,Grueber Herbert A(Herbert Appold),1846-1927,Rapson E. J(Edward James),1861-1937,Codrington O(Oliver),-1921,Hill George FrancisSir,1867-1948,Brooke George CyrilRoyal Numismatic Society (Great Britain)JOURNAL996200324603316exl_impl conversionThe numismatic chronicle and journal of the Royal Numismatic Society2220678UNISA