LEADER 09298nam 22008535 450 001 996465582703316 005 20200705134804.0 010 $a3-642-10665-X 024 7 $a10.1007/978-3-642-10665-1 035 $a(CKB)1000000000804417 035 $a(SSID)ssj0000355455 035 $a(PQKBManifestationID)11259248 035 $a(PQKBTitleCode)TC0000355455 035 $a(PQKBWorkID)10340360 035 $a(PQKB)10944054 035 $a(DE-He213)978-3-642-10665-1 035 $a(MiAaPQ)EBC3064873 035 $a(PPN)139962964 035 $a(EXLCZ)991000000000804417 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCloud Computing$b[electronic resource] $eFirst International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings /$fedited by Martin Gilje Jaatun, Gansen Zhao, Chunming Rong 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XX, 707 p.) 225 1 $aComputer Communication Networks and Telecommunications ;$v5931 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-10664-1 327 $aInvited Papers -- The Many Colors and Shapes of Cloud -- Biomedical Case Studies in Data Intensive Computing -- An Industrial Cloud: Integrated Operations in Oil and Gas in the Norwegian Continental Shelf -- Cloudbus Toolkit for Market-Oriented Cloud Computing -- Full Papers -- Self-healing and Hybrid Diagnosis in Cloud Computing -- Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges -- Trust Model to Enhance Security and Interoperability of Cloud Environment -- Dynamic Malicious Code Detection Based on Binary Translator -- A Privacy Manager for Cloud Computing -- Privacy in a Semantic Cloud: What?s Trust Got to Do with It? -- Data Protection-Aware Design for Cloud Services -- Accountability as a Way Forward for Privacy Protection in the Cloud -- Towards an Approach of Semantic Access Control for Cloud Computing -- Identity-Based Authentication for Cloud Computing -- Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography -- Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes -- Data Center Consolidation: A Step towards Infrastructure Clouds -- Decentralized Service Allocation in a Broker Overlay Based Grid -- DisTec: Towards a Distributed System for Telecom Computing -- Cloud Computing Boosts Business Intelligence of Telecommunication Industry -- Composable IO: A Novel Resource Sharing Platform in Personal Clouds -- SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud -- Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation -- Cloud-Oriented Virtual Machine Management with MLN -- A Systematic Process for Developing High Quality SaaS Cloud Services -- Cloud Computing Service Composition and Search Based on Semantic -- Deploying Mobile Computation in Cloud Service -- A Novel Method for Mining SaaS Software Tag via Community Detection in Software Services Network -- Retrieving and Indexing Spatial Data in the Cloud Computing Environment -- Search Engine Prototype System Based on Cloud Computing -- Distributed Structured Database System HugeTable -- Cloud Computing: A Statistics Aspect of Users -- An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway -- Web Server Farm in the Cloud: Performance Evaluation and Dynamic Architecture -- SPECI, a Simulation Tool Exploring Cloud-Scale Data Centres -- CloudWF: A Computational Workflow System for Clouds Based on Hadoop -- A Novel Multipath Load Balancing Algorithm in Fat-Tree Data Center -- Scheduling Active Services in Clustered JBI Environment -- Task Parallel Scheduling over Multi-core System -- Cost-Minimizing Scheduling of Workflows on a Cloud of Memory Managed Multicore Machines -- Green Cloud on the Horizon -- Industrial Cloud: Toward Inter-enterprise Integration -- Community Cloud Computing -- A Semantic Grid Oriented to E-Tourism -- Irregular Community Discovery for Social CRM in Cloud Computing -- A Contextual Information Acquisition Approach Based on Semantics and Mashup Technology -- Evaluating MapReduce on Virtual Machines: The Hadoop Case -- APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing -- Short Papers -- Secure Document Service for Cloud Computing -- Privacy of Value-Added Context-Aware Service Cloud -- A Simple Technique for Securing Data at Rest Stored in a Computing Cloud -- Access Control of Cloud Service Based on UCON -- Replica Replacement Strategy Evaluation Based on Grid Locality -- Performance Evaluation of Cloud Service Considering Fault Recovery -- BlueSky Cloud Framework: An E-Learning Framework Embracing Cloud Computing -- Cloud Infrastructure & Applications ? CloudIA -- One Program Model for Cloud Computing -- Enterprise Cloud Architecture for Chinese Ministry of Railway -- Research on Cloud Computing Based on Deep Analysis to Typical Platforms -- Automatic Construction of SP Problem-Solving Resource Space -- An Idea of Special Cloud Computing in Forest Pests? Control -- IBM Cloud Computing Powering a Smarter Planet -- Cloud Computing: An Overview -- Integrating Cloud-Computing-Specific Model into Aircraft Design -- Towards a Theory of Universally Composable Cloud Computing -- A Service-Oriented Qos-Assured and Multi-Agent Cloud Computing Architecture -- Price-Oriented Trading Optimization for Grid Resource -- A Requirements Recommendation Method Based on Service Description -- Extending YML to Be a Middleware for Scientific Cloud Computing -- Power-Aware Management in Cloud Data Centers -- Parallel K-Means Clustering Based on MapReduce -- Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce -- Distributed Scheduling Extension on Hadoop -- A Data Distribution Aware Task Scheduling Strategy for MapReduce System -- Cloud Computing Based Internet Data Center. 330 $aThis book constitutes the reviewed proceedings of the first International Conference on Cloud Computing, CloudCom 2009, held in Beijing, China, December 1-4, 2009. The 42 full papers presented together with four invited papers were carefully selected from 200 submissions. This book includes but are not limited to deal with topics like cloud /grid architecture, load balancing, optimal deploy configuration, consistency models, virtualization technologies, middleware frameworks, software as a Service (SaaS), hardware as a Service (HaaS), data grid & semantic web, web services, security and Risk, fault tolerance and reliability, auditing, monitoring and scheduling, utility computing, high-performance computing and peer to peer computing. 410 0$aComputer Communication Networks and Telecommunications ;$v5931 606 $aComputer communication systems 606 $aComputer organization 606 $aComputer system failures 606 $aComputer software?Reusability 606 $aArchitecture, Computer 606 $aSoftware engineering 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aPerformance and Reliability$3https://scigraph.springernature.com/ontologies/product-market-codes/I12077 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aSoftware Engineering/Programming and Operating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14002 608 $aKongress.$2swd 608 $aOnline-Publikation.$2swd 608 $aPeking (2009)$2swd 615 0$aComputer communication systems. 615 0$aComputer organization. 615 0$aComputer system failures. 615 0$aComputer software?Reusability. 615 0$aArchitecture, Computer. 615 0$aSoftware engineering. 615 14$aComputer Communication Networks. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aSystem Performance and Evaluation. 615 24$aPerformance and Reliability. 615 24$aComputer System Implementation. 615 24$aSoftware Engineering/Programming and Operating Systems. 676 $a004.67/82 686 $aDAT 060f$2stub 686 $aDAT 250f$2stub 686 $aSS 4800$2rvk 702 $aJaatun$b Martin Gilje$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhao$b Gansen$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRong$b Chunming$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCloudCom 2009 906 $aBOOK 912 $a996465582703316 996 $aCloud Computing$9773733 997 $aUNISA LEADER 02024nam 2200493 a 450 001 9910696480303321 005 20080227101227.0 035 $a(CKB)5470000002378035 035 $a(OCoLC)212043420 035 $a(EXLCZ)995470000002378035 100 $a20080227d2008 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBorder security$b[electronic resource] $edespite progress, weaknesses in traveler inspections exist at our Nation's ports of entry : testimony before the Committee on Homeland Security, House of Representatives /$fstatement of Richard M. Stana 210 1$a[Washington, D.C.] :$cU.S. Govt. Accountability Office,$d[2008] 215 $a13 pages $cdigital, PDF file 225 1 $aTestimony ;$vGAO-08-329 T 300 $aTitle from title screen (viewed on Feb. 14, 2008). 300 $a"For release ... January 3, 2008." 300 $aPaper version available from: U.S. Govt. Accountability Office, 441 G St., NW, Rm. LM, Washington, D.C. 20548. 320 $aIncludes bibliographical references. 517 $aBorder security 606 $aVisitors, Foreign$xGovernment policy$zUnited States 606 $aVisitors, Foreign$zUnited States$xIdentification 606 $aPorts of entry$xSecurity measures$zUnited States 606 $aNational security$zUnited States 606 $aTerrorism$zUnited States$xPrevention 615 0$aVisitors, Foreign$xGovernment policy 615 0$aVisitors, Foreign$xIdentification. 615 0$aPorts of entry$xSecurity measures 615 0$aNational security 615 0$aTerrorism$xPrevention. 700 $aStana$b Richard M$01380644 712 02$aUnited States.$bCongress.$bHouse.$bCommittee on Homeland Security. 712 02$aUnited States.$bGovernment Accountability Office. 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910696480303321 996 $aBorder security$93464614 997 $aUNINA LEADER 01182nam2 22003133i 450 001 RMS0028935 005 20231121125806.0 010 $a0817637559 100 $a20140924d1995 ||||0itac50 ba 101 | $aeng 102 $aus 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 0 $a1 210 $aBoston [etc.]$cBirkhauser$dc1995 215 $aXXII, 292 p.$cill.$d24 cm 225 | $aProgress in mathematics$v131 410 0$1001MIL0011585$12001 $aProgress in mathematics$v131 461 1$1001RMS0024845$12001 $aFunctional analysis on the eve of the 21. century$ein honor of the eightieth birthday of I. M. Gelfand$fSimon Gindikin, James Lepowsky, Robert L. Wilson editors$v1 606 $aAnalisi funzionale$2FIR$3RMLC196991$9I 676 $a515.7$9$v20 801 3$aIT$bIT-01$c20140924 850 $aIT-FR0099 899 $aBiblioteca Area Ingegneristica$bFR0099 912 $aRMS0028935 950 2$aBiblioteca Area Ingegneristica$d 54DII 515 FUN I$e 54VM 0000090665 VM barcode:ING3622D. - Inventario:3622d. - Fondo:CONVM$fA $h19991130$i20121204 977 $a 54 996 $a1$961339 997 $aUNICAS LEADER 01191nam0 22003131i 450 001 RML0271915 005 20231121125725.0 010 $a8838625050 100 $a20121121d2000 ||||0itac50 ba 101 | $aita 102 $ait 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $a˜L'œorganizzazione nelle aziende sanitarie$fa cura di Mara Bergamaschi$gprefazione di Elio Borgonovi 210 $aMilano [etc.] $cMcGraw-Hill Libri Italia $d©2000 215 $aXIV, 304 p.$d21 cm 300 $aInclude bibliografia e indice 606 $aServizio sanitario$xGestione$2FIR$3RMLC377562$9I 676 $a353.93$9$v20 702 1$aBORGONOVI$b, Elio$3RMLV148367 702 1$aBergamaschi$b, Mara$3RMLV169551 801 3$aIT$bIT-01$c20121121 850 $aIT-FR0098 899 $aBiblioteca Area Giuridico Economica$bFR0098 912 $aRML0271915 950 0$aBiblioteca Area Giuridico Economica$d 53IMP 353.93/3$e 53VM 0000421265 VM barcode:ECO012892. - Inventario:8152. - Fondo:Sala consultazioneVM$fA $h20040330$i20121204 977 $a 53 996 $aOrganizzazione nelle aziende sanitarie$966072 997 $aUNICAS LEADER 01184nam0 22002531i 450 001 UON00451425 005 20231205105043.117 100 $a20150309e1972 |0itac50 ba 101 $aeng 102 $aUS 105 $a|||| ||||| 200 1 $aˆAn ‰introduction to the history of poetry in Scotland, from the beginning of the thirteenth century down to the present time$fAlexander Campbell 210 $aNew York$cGarland publishing$d1972 215 $a222 p.$d21 cm. Ripr. facs. dell'ed.: London, 1798-9 316 $avalore estimato$5IT-UONSI Angl7 GARCAM 620 $aUS$dNew York$3UONL000050 700 1$aCAMPBELL$bAlexander$3UONV071311$0558781 712 $aGarland Publishing$3UONV256509$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00451425 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI Angl 7 GAR CAM $eSI SI 5935/30 7 valore estimato$sBuono 996 $aIntroduction to the history of poetry in Scotland, from the beginning of the thirteenth century down to the present time$91329962 997 $aUNIOR LEADER 01749nam0 22003611i 450 001 UON00462258 005 20231205105129.301 010 $a978-88-07-10511-1 100 $a20151214d2015 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $aLezioni sulla volontà di sapere$ecorso al Collège de France (1970-1971), seguito da Il sapere di Edipo$fMichel Foucault$gedizione stabilita da Daniel Defert sotto la direzione di François Ewald e Alessandro Fontana$gtraduzione di Massimiliano Nicoli e Carla Troilo$gedizione italiana a cura di Pier Aldo Rovatti 210 $aMilano$cFeltrinelli$d2015 215 $a345 p.$d22 cm. 410 1$1001UON00176684$12001 $aCampi del sapere. Critica$1210 $aMilano$cFeltrinelli 606 $aVerità$3UONC025737$2FI 620 $aIT$dMilano$3UONL000005 676 $a111$cONTOLOGIA$v20 700 1$aFoucault$bMichel$3UONV100301$0124914 702 1$aDefert$bDaniel$3UONV207243 702 1$aEwald$bFrançois$3UONV137932 702 1$aFontana$bAlessandro$3UONV118611 702 1$aNicoli$bMassimiliano$3UONV229856 702 1$aRovatti$bPier Aldo$3UONV115789 712 $aFeltrinelli$3UONV246160$4650 801 $aIT$bSOL$c20250613$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00462258 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI FS 2.0 1096 $eSI 15941 5 1096 $sBuono 951 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$bSI20151716 1J 20151215Vs. Prev. del 17/11/2015 996 $aLezioni sulla volontà di sapere$91397753 997 $aUNIOR