LEADER 01293nem0-2200397---450- 001 990009597570403321 005 20120628092629.0 035 $a000959757 035 $aFED01000959757 035 $a(Aleph)000959757FED01 035 $a000959757 100 $a20120627d1954----km-y0itay50------ba 101 0 $aita 102 $aIT 120 $ab--------bl-- 121 $aaa-aabb-a$b-------- 123 1 $aa$b1:25000$de0040000$ee0040730$fn0401500$gn0401000 124 $aa$bd$c--$db$e-$f--$g-- 200 1 $aTursi$bDocumento cartografico$fIGM 206 $a1:25000 ; proiezione conforme universale trasversa di Mercatore (E4°-E4°07'30''/N40°15'-N40°15') 210 $aFirenze$cIGM$d1954 215 $a1 carta$ccolor.$d37 x 42 cm su foglio 51 x 62 cm 225 1 $aCarta d'Italia$v212, quadrante 4, tavoletta SO 300 $aIl meridiano di riferimento č Monte Mario, Roma 300 $aRilievo del 1949 540 1 $aFoglio 212, quadrante 4, tavoletta S. O. 540 1 $aRotondella 610 0 $aBasilicata$aCarte 710 02$aIstituto geografico militare$05005 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aMP 912 $a990009597570403321 952 $aMP Cass. 2 212, 4(3)$bIst. s.i.$fILFGE 959 $aILFGE 996 $aTursi$9845091 997 $aUNINA LEADER 04776nam 22008295 450 001 9910485143003321 005 20251107172216.0 010 $a3-642-02704-0 024 7 $a10.1007/978-3-642-02704-8 035 $a(CKB)1000000000761219 035 $a(SSID)ssj0000316417 035 $a(PQKBManifestationID)11275356 035 $a(PQKBTitleCode)TC0000316417 035 $a(PQKBWorkID)10275510 035 $a(PQKB)10151754 035 $a(DE-He213)978-3-642-02704-8 035 $a(MiAaPQ)EBC3064362 035 $a(PPN)136307078 035 $a(EXLCZ)991000000000761219 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAutonomic and Trusted Computing $e6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings /$fedited by Juan González Nieto, Guojun Wang, Wolfgang Reif, Jadwiga Indulska 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 269 p.) 225 1 $aProgramming and Software Engineering,$x2945-9168 ;$v5586 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-02703-2 320 $aIncludes bibliographical references and index. 327 $aKeynote Speech -- Design for Trust in Ambient and Ubiquitous Computing -- Organic and Autonomic Computing -- Towards an Organic Network Control System -- A Universal Self-Organization Mechanism for Role-Based Organic Computing Systems -- Towards Self-organization in Automotive Embedded Systems -- Analyzing the Behavior of an Artificial Hormone System for Task Allocation -- A Software Test Cases Automated Generation Algorithm Based on Immune Principles -- Management without (Detailed) Models -- Formal Development of Self-organising Systems -- Using Reinforcement Learning for Multi-policy Optimization in Decentralized Autonomic Systems ? An Experimental Evaluation -- Trusted Computing -- SAConf: Semantic Attestation of Software Configurations -- ALOPA: Authorization Logic for Property Attestation in Trusted Platforms -- Wireless Sensor Networks -- Employed BPN to Multi-sensors Data Fusion for Environment Monitoring Services -- Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks -- Trust -- A Methodology towards Usable Trust Management -- Formalizing Trust Based on Usage Behaviours for Mobile Applications -- Toward Trustworthy Semantic Web Service Discovery and Selection -- Fuzzy Regression Based Trust Prediction in Service-Oriented Applications -- Theories of Trust for Communication Protocols -- Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. 330 $aThis book constitutes the refereed procedings of the 6th International Conference on Autonomic and Trusted Computing, ATC 2009, held in Brisbane, Australia, in July 2009, co-located with UIC 2009, the 6th International Conference on Ubiquitous Intelligence and Computing. The 17 revised full papers presented together with one invited paper and one keynote talk were carefully reviewed and selected from 52 submissions. The regular papers are organized in topical sections on organic and autonomic computing, trusted computing, wireless sensor networks, and trust. 410 0$aProgramming and Software Engineering,$x2945-9168 ;$v5586 606 $aData protection 606 $aSoftware engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aCryptology 606 $aComputer and Information Systems Applications 606 $aIT Operations 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputer and Information Systems Applications. 615 24$aIT Operations. 676 $a005.8 701 $aGonzalez Nieto$b Juan M$01754284 712 12$aATC 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485143003321 996 $aAutonomic and trusted computing$94196600 997 $aUNINA