International journal of pervasive computing and communications |
Pubbl/distr/stampa | Leicester : , : Troubador Publishing, , 2005- |
Disciplina | 004.6 |
Soggetto topico |
Ubiquitous computing
Mobile computing Computer network protocols Computer network architectures Application software - Development Informatique omniprésente Informatique mobile Protocoles de réseaux d'ordinateurs Réseaux d'ordinateurs - Architectures Logiciels d'application - Développement Publications périodiques Réseaux sans fil Réseaux informatiques |
Soggetto genere / forma | Periodicals. |
ISSN | 1742-738X |
Classificazione | 54.81 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Pervasive computing and communications
JPCC |
Record Nr. | UNISA-996398340503316 |
Leicester : , : Troubador Publishing, , 2005- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
International journal of pervasive computing and communications |
Pubbl/distr/stampa | Leicester : , : Troubador Publishing, , 2005- |
Disciplina | 004.6 |
Soggetto topico |
Ubiquitous computing
Mobile computing Computer network protocols Computer network architectures Application software - Development Informatique omniprésente Informatique mobile Protocoles de réseaux d'ordinateurs Réseaux d'ordinateurs - Architectures Logiciels d'application - Développement Publications périodiques Réseaux sans fil Réseaux informatiques |
Soggetto genere / forma | Periodicals. |
ISSN | 1742-738X |
Classificazione | 54.81 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Pervasive computing and communications
JPCC |
Record Nr. | UNINA-9910144190003321 |
Leicester : , : Troubador Publishing, , 2005- | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Keeping found things found [[electronic resource] ] : the study and practice of personal information management / / William Jones |
Autore | Jones William P. <1952-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008 |
Descrizione fisica | 1 online resource (447 p.) |
Disciplina | 025.04 |
Collana |
Morgan Kaufmann series in multimedia information and systems
Morgan Kaufmann series in interactive technologies |
Soggetto topico |
Personal information management
Information retrieval Privacy |
ISBN |
1-281-07068-8
9786611070687 0-08-055415-6 |
Classificazione |
85.20
54.81 53.71 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Keeping Found Things Found; Copyright Page; Contents; Preface; Contributors; Chapter 1. A study and a practice; 1.1 Keeping found things found; 1.2 An ideal and the reality; 1.3 A brief history of PIM; 1.4 Who benefits from better PIM and how?; 1.5 A study and a practice; 1.6 Looking forward: A map for this book; Chapter 2. A personal space of information; 2.1 Starting out; 2.2 What is information to us?; 2.3 How is information personal?; 2.4 The information item and its form; 2.5 Defining a personal space of information; 2.6 Making sense of the PSI
2.7 Looking back, looking forward Chapter 3. A framework for personal information management; 3.1 Starting out; 3.2 Perspectives on personal information management; 3.3 PIM activities to map between information and need; 3.4 PIM-related activities and PIM-related areas; 3.5 Weaving PIM activities together; 3.6 Looking back, looking forward; Chapter 4. Finding and re-finding: From need to information; 4.1 Starting out; 4.2 Getting oriented; 4.3 Everyday finding: Death by a thousand look-ups; 4.4 Finding is multistep; 4.5 The limitations in ideal dialogs of finding 4.6 Way finding through the PSI 4.7 Looking back, looking forward; Chapter 5. Keeping and organizing: From information to need; 5.1 Starting out; 5.2 Getting oriented; 5.3 Everyday keeping and organizing: To each his own; 5.4 Keeping is multifaceted; 5.5 The limitations of future perfect visions; 5.6 PICing our battles; 5.7 Looking back, looking forward; Chapter 6. Maintaining for now and for later; 6.1 Starting out; 6.2 Getting oriented; 6.3 Maintaining for now; 6.4 Maintaining for later; 6.5 Maintaining for our lives and beyond; 6.6 Looking back, looking forward Chapter 7. Managing privacy and the flow of information 7.1 Starting out; 7.2 Getting oriented; 7.3 Managing the outflow; 7.4 Managing the inflow; 7.5 Staying in the flow; 7.6 Looking back, looking forward; Chapter 8. Measuring and evaluating; 8.1 Starting out; 8.2 Getting oriented; 8.3 A yardstick for measuring PIM practice elements; 8.4 What can research tell us about methods of measuring and evaluating in our practices of PIM?; 8.5 Measuring and evaluating in real life; 8.6 Can self-study of PIM practices contribute to the larger study of PIM?; 8.7 Looking back, looking forward Chapter 9. Making sense of things 9.1 Starting out; 9.2 Getting oriented; 9.3 Making sense as outcome vs. activity; 9.4 Making sense of things as a PIM activity; 9.5 Methods for making sense; 9.6 Looking back, looking forward; Chapter 10. Email disappears?; 10.1 Starting out: Is email a very successful failure?; 10.2 PIM problems in email: The one-two punch; 10.3 PIM activities in email; 10.4 Future visions of email; 10.5 Looking back, looking forward; Chapter 11. Search gets personal; 11.1 Starting out; 11.2 Search-as-interaction; 11.3 Search-as-technology; 11.4 Making search more personal 11.5 Wayfinding and search |
Record Nr. | UNINA-9910777320603321 |
Jones William P. <1952-> | ||
Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Keeping found things found [[electronic resource] ] : the study and practice of personal information management / / William Jones |
Autore | Jones William P. <1952-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008 |
Descrizione fisica | 1 online resource (447 p.) |
Disciplina | 025.04 |
Collana |
Morgan Kaufmann series in multimedia information and systems
Morgan Kaufmann series in interactive technologies |
Soggetto topico |
Personal information management
Information retrieval Privacy |
ISBN |
1-281-07068-8
9786611070687 0-08-055415-6 |
Classificazione |
85.20
54.81 53.71 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Keeping Found Things Found; Copyright Page; Contents; Preface; Contributors; Chapter 1. A study and a practice; 1.1 Keeping found things found; 1.2 An ideal and the reality; 1.3 A brief history of PIM; 1.4 Who benefits from better PIM and how?; 1.5 A study and a practice; 1.6 Looking forward: A map for this book; Chapter 2. A personal space of information; 2.1 Starting out; 2.2 What is information to us?; 2.3 How is information personal?; 2.4 The information item and its form; 2.5 Defining a personal space of information; 2.6 Making sense of the PSI
2.7 Looking back, looking forward Chapter 3. A framework for personal information management; 3.1 Starting out; 3.2 Perspectives on personal information management; 3.3 PIM activities to map between information and need; 3.4 PIM-related activities and PIM-related areas; 3.5 Weaving PIM activities together; 3.6 Looking back, looking forward; Chapter 4. Finding and re-finding: From need to information; 4.1 Starting out; 4.2 Getting oriented; 4.3 Everyday finding: Death by a thousand look-ups; 4.4 Finding is multistep; 4.5 The limitations in ideal dialogs of finding 4.6 Way finding through the PSI 4.7 Looking back, looking forward; Chapter 5. Keeping and organizing: From information to need; 5.1 Starting out; 5.2 Getting oriented; 5.3 Everyday keeping and organizing: To each his own; 5.4 Keeping is multifaceted; 5.5 The limitations of future perfect visions; 5.6 PICing our battles; 5.7 Looking back, looking forward; Chapter 6. Maintaining for now and for later; 6.1 Starting out; 6.2 Getting oriented; 6.3 Maintaining for now; 6.4 Maintaining for later; 6.5 Maintaining for our lives and beyond; 6.6 Looking back, looking forward Chapter 7. Managing privacy and the flow of information 7.1 Starting out; 7.2 Getting oriented; 7.3 Managing the outflow; 7.4 Managing the inflow; 7.5 Staying in the flow; 7.6 Looking back, looking forward; Chapter 8. Measuring and evaluating; 8.1 Starting out; 8.2 Getting oriented; 8.3 A yardstick for measuring PIM practice elements; 8.4 What can research tell us about methods of measuring and evaluating in our practices of PIM?; 8.5 Measuring and evaluating in real life; 8.6 Can self-study of PIM practices contribute to the larger study of PIM?; 8.7 Looking back, looking forward Chapter 9. Making sense of things 9.1 Starting out; 9.2 Getting oriented; 9.3 Making sense as outcome vs. activity; 9.4 Making sense of things as a PIM activity; 9.5 Methods for making sense; 9.6 Looking back, looking forward; Chapter 10. Email disappears?; 10.1 Starting out: Is email a very successful failure?; 10.2 PIM problems in email: The one-two punch; 10.3 PIM activities in email; 10.4 Future visions of email; 10.5 Looking back, looking forward; Chapter 11. Search gets personal; 11.1 Starting out; 11.2 Search-as-interaction; 11.3 Search-as-technology; 11.4 Making search more personal 11.5 Wayfinding and search |
Record Nr. | UNINA-9910810556003321 |
Jones William P. <1952-> | ||
Amsterdam ; ; Boston, : Morgan Kaufmann Publishers, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Networking and online games [[electronic resource] ] : understanding and engineering multiplayer Internet games / / Grenville Armitage, Mark Claypool, Philip Branch |
Autore | Armitage Grenville |
Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2006 |
Descrizione fisica | 1 online resource (234 p.) |
Disciplina | 794.814678 |
Altri autori (Persone) |
ClaypoolMark
BranchPhilip |
Soggetto topico |
Computer games - Programming
TCP/IP (Computer network protocol) Internet games |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-60608-8
9786610606085 0-470-03047-X 0-470-03046-1 |
Classificazione | 54.81 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Networking and Online Games; Contents; Author Biographies; Acknowledgements; 1 Introduction; 2 Early Online and Multiplayer Games; 2.1 Defining Networked and Multiplayer Games; 2.2 Early Multiplayer Games; 2.2.1 PLATO; 2.2.2 MultiUser Dungeons; 2.2.3 Arcade Games; 2.2.4 Hosted Online Games; 2.3 Multiplayer Network Games; 2.3.1 DOOM - Networked First-Person Shooters Arrive; References; 3 Recent Online and Multiplayer Games; 3.1 Communication Architectures; 3.2 The Evolution of Online Games; 3.2.1 FPS Games; 3.2.2 Massively Multiplayer Games; 3.2.3 RTS Games; 3.2.4 Sports Games
3.3 Summary of Growth of Online Games3.4 The Evolution of Online Game Platforms; 3.4.1 PCs; 3.4.2 Game Consoles; 3.4.3 Handheld Game Consoles; 3.4.4 Summary; 3.5 Context of Computer Games; 3.5.1 Physical Reality; 3.5.2 Telepresence; 3.5.3 Augmented Reality; 3.5.4 Distributed Virtual Environments; References; 4 Basic Internet Architecture; 4.1 IP Networks as seen from the Edge; 4.1.1 Endpoints and Addressing; 4.1.2 Layered Transport Services; 4.1.3 Unicast, Broadcast and Multicast; 4.2 Connectivity and Routing; 4.2.1 Hierarchy and Aggregation; 4.2.2 Routing Protocols 4.2.3 Per-hop Packet Transport4.3 Address Management; 4.3.1 Address Delegation and Assignment; 4.3.2 Network Address Translation; 4.3.3 Dynamic Host Configuration Protocol; 4.3.4 Domain Name System; References; 5 Network Latency, Jitter and Loss; 5.1 The Relevance of Latency, Jitter and Loss; 5.2 Sources of Latency, Jitter and Loss in the Network; 5.2.1 Propagation Delay and the Laws of Physics; 5.2.2 Serialisation; 5.2.3 Queuing Delays; 5.2.4 Sources of Jitter in the Network; 5.2.5 Sources of Packet Loss in the Network; 5.3 Network Control of Lag, Jitter and Loss 5.3.1 Preferential IP Layer Queuing and Scheduling5.3.2 Link Layer Support for Packet Prioritisation; 5.3.3 Where to Place and Trust Traffic Classification; 5.4 Measuring Network Conditions; References; 6 Latency Compensation Techniques; 6.1 The Need for Latency Compensation; 6.2 Prediction; 6.2.1 Player Prediction; 6.2.2 Opponent Prediction; 6.2.3 Prediction Summary; 6.3 Time Manipulation; 6.3.1 Time Delay; 6.3.2 Time Warp; 6.3.3 Data compression; 6.4 Visual Tricks; 6.5 Latency Compensation and Cheating; References; 7 Playability versus Network Conditions and Cheats 7.1 Measuring Player Tolerance for Network Disruptions7.1.1 Empirical Research; 7.1.2 Sources of Error and Uncertainty; 7.1.3 Considerations for Creating Artificial Network Conditions; 7.2 Communication Models, Cheats and Cheat-Mitigation; 7.2.1 Classifying and Naming Methods of Cheating; 7.2.2 Server-side Cheats; 7.2.3 Client-side Cheats; 7.2.4 Network-layer Cheats; 7.2.5 Cheat-mitigation; References; 8 Broadband Access Networks; 8.1 What Broadband Access Networks are and why they Matter; 8.1.1 The Role of Broadband Access Networks; 8.1.2 Characteristics of Broadband Access Networks 8.2 Access Network Protocols and Standards |
Record Nr. | UNINA-9910143734203321 |
Armitage Grenville | ||
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Networking and online games [[electronic resource] ] : understanding and engineering multiplayer Internet games / / Grenville Armitage, Mark Claypool, Philip Branch |
Autore | Armitage Grenville |
Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2006 |
Descrizione fisica | 1 online resource (234 p.) |
Disciplina | 794.814678 |
Altri autori (Persone) |
ClaypoolMark
BranchPhilip |
Soggetto topico |
Computer games - Programming
TCP/IP (Computer network protocol) Internet games |
ISBN |
1-280-60608-8
9786610606085 0-470-03047-X 0-470-03046-1 |
Classificazione | 54.81 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Networking and Online Games; Contents; Author Biographies; Acknowledgements; 1 Introduction; 2 Early Online and Multiplayer Games; 2.1 Defining Networked and Multiplayer Games; 2.2 Early Multiplayer Games; 2.2.1 PLATO; 2.2.2 MultiUser Dungeons; 2.2.3 Arcade Games; 2.2.4 Hosted Online Games; 2.3 Multiplayer Network Games; 2.3.1 DOOM - Networked First-Person Shooters Arrive; References; 3 Recent Online and Multiplayer Games; 3.1 Communication Architectures; 3.2 The Evolution of Online Games; 3.2.1 FPS Games; 3.2.2 Massively Multiplayer Games; 3.2.3 RTS Games; 3.2.4 Sports Games
3.3 Summary of Growth of Online Games3.4 The Evolution of Online Game Platforms; 3.4.1 PCs; 3.4.2 Game Consoles; 3.4.3 Handheld Game Consoles; 3.4.4 Summary; 3.5 Context of Computer Games; 3.5.1 Physical Reality; 3.5.2 Telepresence; 3.5.3 Augmented Reality; 3.5.4 Distributed Virtual Environments; References; 4 Basic Internet Architecture; 4.1 IP Networks as seen from the Edge; 4.1.1 Endpoints and Addressing; 4.1.2 Layered Transport Services; 4.1.3 Unicast, Broadcast and Multicast; 4.2 Connectivity and Routing; 4.2.1 Hierarchy and Aggregation; 4.2.2 Routing Protocols 4.2.3 Per-hop Packet Transport4.3 Address Management; 4.3.1 Address Delegation and Assignment; 4.3.2 Network Address Translation; 4.3.3 Dynamic Host Configuration Protocol; 4.3.4 Domain Name System; References; 5 Network Latency, Jitter and Loss; 5.1 The Relevance of Latency, Jitter and Loss; 5.2 Sources of Latency, Jitter and Loss in the Network; 5.2.1 Propagation Delay and the Laws of Physics; 5.2.2 Serialisation; 5.2.3 Queuing Delays; 5.2.4 Sources of Jitter in the Network; 5.2.5 Sources of Packet Loss in the Network; 5.3 Network Control of Lag, Jitter and Loss 5.3.1 Preferential IP Layer Queuing and Scheduling5.3.2 Link Layer Support for Packet Prioritisation; 5.3.3 Where to Place and Trust Traffic Classification; 5.4 Measuring Network Conditions; References; 6 Latency Compensation Techniques; 6.1 The Need for Latency Compensation; 6.2 Prediction; 6.2.1 Player Prediction; 6.2.2 Opponent Prediction; 6.2.3 Prediction Summary; 6.3 Time Manipulation; 6.3.1 Time Delay; 6.3.2 Time Warp; 6.3.3 Data compression; 6.4 Visual Tricks; 6.5 Latency Compensation and Cheating; References; 7 Playability versus Network Conditions and Cheats 7.1 Measuring Player Tolerance for Network Disruptions7.1.1 Empirical Research; 7.1.2 Sources of Error and Uncertainty; 7.1.3 Considerations for Creating Artificial Network Conditions; 7.2 Communication Models, Cheats and Cheat-Mitigation; 7.2.1 Classifying and Naming Methods of Cheating; 7.2.2 Server-side Cheats; 7.2.3 Client-side Cheats; 7.2.4 Network-layer Cheats; 7.2.5 Cheat-mitigation; References; 8 Broadband Access Networks; 8.1 What Broadband Access Networks are and why they Matter; 8.1.1 The Role of Broadband Access Networks; 8.1.2 Characteristics of Broadband Access Networks 8.2 Access Network Protocols and Standards |
Record Nr. | UNINA-9910830137303321 |
Armitage Grenville | ||
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Networking and online games [[electronic resource] ] : understanding and engineering multiplayer Internet games / / Grenville Armitage, Mark Claypool, Philip Branch |
Autore | Armitage Grenville |
Pubbl/distr/stampa | Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2006 |
Descrizione fisica | 1 online resource (234 p.) |
Disciplina | 794.814678 |
Altri autori (Persone) |
ClaypoolMark
BranchPhilip |
Soggetto topico |
Computer games - Programming
TCP/IP (Computer network protocol) Internet games |
ISBN |
1-280-60608-8
9786610606085 0-470-03047-X 0-470-03046-1 |
Classificazione | 54.81 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Networking and Online Games; Contents; Author Biographies; Acknowledgements; 1 Introduction; 2 Early Online and Multiplayer Games; 2.1 Defining Networked and Multiplayer Games; 2.2 Early Multiplayer Games; 2.2.1 PLATO; 2.2.2 MultiUser Dungeons; 2.2.3 Arcade Games; 2.2.4 Hosted Online Games; 2.3 Multiplayer Network Games; 2.3.1 DOOM - Networked First-Person Shooters Arrive; References; 3 Recent Online and Multiplayer Games; 3.1 Communication Architectures; 3.2 The Evolution of Online Games; 3.2.1 FPS Games; 3.2.2 Massively Multiplayer Games; 3.2.3 RTS Games; 3.2.4 Sports Games
3.3 Summary of Growth of Online Games3.4 The Evolution of Online Game Platforms; 3.4.1 PCs; 3.4.2 Game Consoles; 3.4.3 Handheld Game Consoles; 3.4.4 Summary; 3.5 Context of Computer Games; 3.5.1 Physical Reality; 3.5.2 Telepresence; 3.5.3 Augmented Reality; 3.5.4 Distributed Virtual Environments; References; 4 Basic Internet Architecture; 4.1 IP Networks as seen from the Edge; 4.1.1 Endpoints and Addressing; 4.1.2 Layered Transport Services; 4.1.3 Unicast, Broadcast and Multicast; 4.2 Connectivity and Routing; 4.2.1 Hierarchy and Aggregation; 4.2.2 Routing Protocols 4.2.3 Per-hop Packet Transport4.3 Address Management; 4.3.1 Address Delegation and Assignment; 4.3.2 Network Address Translation; 4.3.3 Dynamic Host Configuration Protocol; 4.3.4 Domain Name System; References; 5 Network Latency, Jitter and Loss; 5.1 The Relevance of Latency, Jitter and Loss; 5.2 Sources of Latency, Jitter and Loss in the Network; 5.2.1 Propagation Delay and the Laws of Physics; 5.2.2 Serialisation; 5.2.3 Queuing Delays; 5.2.4 Sources of Jitter in the Network; 5.2.5 Sources of Packet Loss in the Network; 5.3 Network Control of Lag, Jitter and Loss 5.3.1 Preferential IP Layer Queuing and Scheduling5.3.2 Link Layer Support for Packet Prioritisation; 5.3.3 Where to Place and Trust Traffic Classification; 5.4 Measuring Network Conditions; References; 6 Latency Compensation Techniques; 6.1 The Need for Latency Compensation; 6.2 Prediction; 6.2.1 Player Prediction; 6.2.2 Opponent Prediction; 6.2.3 Prediction Summary; 6.3 Time Manipulation; 6.3.1 Time Delay; 6.3.2 Time Warp; 6.3.3 Data compression; 6.4 Visual Tricks; 6.5 Latency Compensation and Cheating; References; 7 Playability versus Network Conditions and Cheats 7.1 Measuring Player Tolerance for Network Disruptions7.1.1 Empirical Research; 7.1.2 Sources of Error and Uncertainty; 7.1.3 Considerations for Creating Artificial Network Conditions; 7.2 Communication Models, Cheats and Cheat-Mitigation; 7.2.1 Classifying and Naming Methods of Cheating; 7.2.2 Server-side Cheats; 7.2.3 Client-side Cheats; 7.2.4 Network-layer Cheats; 7.2.5 Cheat-mitigation; References; 8 Broadband Access Networks; 8.1 What Broadband Access Networks are and why they Matter; 8.1.1 The Role of Broadband Access Networks; 8.1.2 Characteristics of Broadband Access Networks 8.2 Access Network Protocols and Standards |
Record Nr. | UNINA-9910841606003321 |
Armitage Grenville | ||
Chichester, England ; ; Hoboken, NJ, : John Wiley & Sons, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The next wave of technologies [[electronic resource] ] : opportunities from chaos / / Phil Simon |
Autore | Simon Phil |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, c2010 |
Descrizione fisica | 1 online resource (435 p.) |
Disciplina | 004.068 |
Soggetto topico |
Information technology - Management
Technological innovations - Management Computer systems - Management Cloud computing |
ISBN |
1-119-19994-8
1-282-55022-5 9786612550225 0-470-61308-4 0-470-61306-8 |
Classificazione | 54.81 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Next Wave of Technologies: Opportunities from Chaos; Contents; Foreword; Preface; Acknowledgments; About the Contributors; Part I: Introduction, Background, and Definitions; Chapter 1: The Changing Landscapes of Business and Technology; Chapter 2: How the Game Has Changed; Chapter 3: The Role of IT in an Enterprise 2.0 World; Part II: Architecture, Software Development, and Frameworks; Chapter 4: Cloud Computing; Chapter 5: Open Source: The War That Both Sides Won; Chapter 6: Software as a Service (SaaS); Chapter 7: Service-Oriented Architecture; Chapter 8: Managing Mobile Business
Chapter 9: Social NetworkingPart III: Data, Information, and Knowledge; Chapter 10: Enterprise Search and Retrieval; Chapter 11: Enterprise 2.0 Business Intelligence; Chapter 12: Master Data Management; Chapter 13: Procurement in Chaos; Part IV: Management and Deployment; Chapter 14: Agile Software Development; Chapter 15: Enterprise Risk Management; Chapter 16: Implementing Open Source Software; Chapter 17: Global Engineering; Chapter 18: Enterprise 2.0 IT Project Failure; Chapter 19: Readying the Troops for Battle; Chapter 20: Sustainability and Green IT; Part V: Conclusion Chapter 21: Finding Opportunity in ChaosBibliography; About the Author; Index |
Record Nr. | UNINA-9910140599503321 |
Simon Phil | ||
Hoboken, N.J., : John Wiley & Sons, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The next wave of technologies [[electronic resource] ] : opportunities from chaos / / Phil Simon |
Autore | Simon Phil |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, c2010 |
Descrizione fisica | 1 online resource (435 p.) |
Disciplina | 004.068 |
Soggetto topico |
Information technology - Management
Technological innovations - Management Computer systems - Management Cloud computing |
ISBN |
1-119-19994-8
1-282-55022-5 9786612550225 0-470-61308-4 0-470-61306-8 |
Classificazione | 54.81 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Next Wave of Technologies: Opportunities from Chaos; Contents; Foreword; Preface; Acknowledgments; About the Contributors; Part I: Introduction, Background, and Definitions; Chapter 1: The Changing Landscapes of Business and Technology; Chapter 2: How the Game Has Changed; Chapter 3: The Role of IT in an Enterprise 2.0 World; Part II: Architecture, Software Development, and Frameworks; Chapter 4: Cloud Computing; Chapter 5: Open Source: The War That Both Sides Won; Chapter 6: Software as a Service (SaaS); Chapter 7: Service-Oriented Architecture; Chapter 8: Managing Mobile Business
Chapter 9: Social NetworkingPart III: Data, Information, and Knowledge; Chapter 10: Enterprise Search and Retrieval; Chapter 11: Enterprise 2.0 Business Intelligence; Chapter 12: Master Data Management; Chapter 13: Procurement in Chaos; Part IV: Management and Deployment; Chapter 14: Agile Software Development; Chapter 15: Enterprise Risk Management; Chapter 16: Implementing Open Source Software; Chapter 17: Global Engineering; Chapter 18: Enterprise 2.0 IT Project Failure; Chapter 19: Readying the Troops for Battle; Chapter 20: Sustainability and Green IT; Part V: Conclusion Chapter 21: Finding Opportunity in ChaosBibliography; About the Author; Index |
Record Nr. | UNINA-9910814421803321 |
Simon Phil | ||
Hoboken, N.J., : John Wiley & Sons, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Service-oriented computing - ICSOC 2008 : 6th international conference, Sydney, Australia, December 1-5, 2008, proceedings / / edited by Athman Bouguettaya, Ingolf Krueger, Tiziana Margaria |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (XVIII, 737 p.) |
Disciplina | 004.36 |
Collana | Programming and Software Engineering |
Soggetto topico |
Electronic data processing - Distributed processing
Electronic commerce Web services |
ISBN | 3-540-89652-X |
Classificazione |
54.81
DAT 250f SS 4800 WIR 917f |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Scale Computing: The Power of Infrastructure as a Service -- Services in the Long Tail World: Challenges and Opportunities -- Services for Science -- Managing and Internet Service Bus -- Quality-Driven Business Policy Specification and Refinement for Service-Oriented Systems -- Adaptation of Web Service Composition Based on Workflow Patterns -- Protocol-Based Web Service Composition -- Design and Implementation of a Fault Tolerant Job Flow Manager Using Job Flow Patterns and Recovery Policies -- Building Mashups for the Enterprise with SABRE -- Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques -- Automatic Workflow Graph Refactoring and Completion -- Authorization and User Failure Resiliency for WS-BPEL Business Processes -- Reasoning on Semantically Annotated Processes -- Event-Driven Quality of Service Prediction -- Automatic Realization of SOA Deployment Patterns in Distributed Environments -- The LLAMA Middleware Support for Accountable Service-Oriented Architecture -- ubiSOAP: A Service Oriented Middleware for Seamless Networking -- Towards a Service-Oriented Approach for Managing Context in Mobile Environment -- An Autonomic Middleware Solution for Coordinating Multiple QoS Controls -- Transparent Runtime Adaptability for BPEL Processes -- Organizational Constraints to Realizing Business Value from Service Oriented Architectures: An Empirical Study of Financial Service Institutions -- E-Marketplace for Semantic Web Services -- Business Driven SOA Customization -- Sound Multi-party Business Protocols for Service Networks -- Automatic Mash Up of Composite Applications -- Non-desynchronizable Service Choreographies -- A Framework for Semantic Sensor Network Services -- Context-Driven Autonomic Adaptation of SLA -- Determining QoS of WS-BPEL Compositions -- An Initial Approach to Explaining SLA Inconsistencies -- Ontology-Based Compatibility Checking for Web Service Configuration Management -- SOAlive Service Catalog: A Simplified Approach to Describing, Discovering and Composing Situational Enterprise Services -- WorldTravel: A Testbed for Service-Oriented Applications -- TCP???Compose ??? – A TCP-Net Based Algorithm for Efficient Composition of Web Services Using Qualitative Preferences -- A Runtime Quality Architecture for Service-Oriented Systems -- QoS Policies for Business Processes in Service Oriented Architectures -- Deriving Business Service Interfaces in Windows Workflow from UMM Transactions -- From Business Process Models to Web Services Orchestration: The Case of UML 2.0 Activity Diagram to BPEL -- Batch Invocation of Web Services in BPEL Process -- Formation of Service Value Networks for Decentralized Service Provisioning -- Towards Automated WSDL-Based Testing of Web Services -- Automated Service Composition with Adaptive Planning -- A Planning-Based Approach for the Automated Configuration of the Enterprise Service Bus -- Verifying Interaction Protocol Compliance of Service Orchestrations -- Specify Once Test Everywhere: Analyzing Invariants to Augment Service Descriptions for Automated Test Generation -- A Model-Driven Approach to Dynamic and Adaptive Service Brokering Using Modes -- Integrated Security Context Management of Web Components and Services in Federated Identity Environments -- Predicting and Learning Executability of Composite Web Services -- Authorization Policy Based Business Collaboration Reliability Verification -- VGC: Generating Valid Global Communication Models of Composite Services Using Temporal Reasoning -- A Framework for Advanced Modularization and Data Flow in Workflow Systems -- Model Identification for Energy-Aware Management of Web Service Systems -- LASS – License Aware Service Selection: Methodology and Framework -- Integrated and Composable Supervision of BPEL Processes -- Optimised Semantic Reasoning for Pervasive Service Discovery -- COSMA – An Approach for Managing SLAs in Composite Services -- Resource Calculations with Constraints, and Placement of Tenants and Instances for Multi-tenant SaaS Applications -- SPIN: Service Performance Isolation Infrastructure in Multi-tenancy Environment -- Management as a Service for IT Service Management -- SMART: Application of a Method for Migration of Legacy Systems to SOA Environments -- Discovering and Deriving Service Variants from Business Process Specifications -- Market Overview of Enterprise Mashup Tools -- Siena: From PowerPoint to Web App in 5 Minutes -- Exploration of Discovered Process Views in Process Spaceship -- ROME4EU: A Web Service-Based Process-Aware System for Smart Devices -- WS-Engineer 2008 -- MetaCDN: Harnessing Storage Clouds for High Performance Content Delivery -- Yowie: Information Extraction in a Service Enabled World. |
Record Nr. | UNINA-9910483816703321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|