ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (130)
  • Computer Science
Collection
Language
Years
  • 1
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Pages: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computer science ; Computer communication systems ; Software engineering ; Mathematical statistics ; Computers ; Artificial intelligence ; Computer graphics ; Computer Science ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Computer Communication Networks ; Software Engineering/Programming and Operating Systems ; Probability and Statistics in Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Smart algorithms --- Data classification and processing --- Stochastic modelling --- Performance evaluation --- Queuing systems --- Wireless networks and security --- Image processing and computer vision
    Pages: Online-Ressource (XIII, 278 pages) , 75 illustrations
    ISBN: 9783319472171
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; Computers ; Education ; Computer Science ; Information Systems and Communication Service ; Education, general
    Description / Table of Contents: Innovative Technologies for an Engaging Classroom (iTEC) --- Development of the Future Classroom Toolkit --- Designing Edukata, a Participatory Design Model for Creating Learning Activities --- The iTEC Technical Artefacts, Architecture and Educational Cloud --- The Composer: Creating, Sharing and Facilitating Learning Designs --- Recommender Systems --- Resources beyond Content for Open Education --- The iTEC Widget Store --- The Impact and Potential of iTEC: Evidence from large-scale Validation in School Classrooms
    Pages: Online-Ressource (XVII, 201 pages) , 47 illustrations, 42 illustrations in color
    ISBN: 9783319193663
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science ; Software engineering ; Computers ; Law and legislation ; Management information systems ; Computer Science ; Management of Computing and Information Systems ; Software Engineering ; Legal Aspects of Computing ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: This book is open access under a CC BY license. This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017. The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, and practices; case studies; projects, communication, and participation; tools; and project management, development and evaluation
    Pages: Online-Ressource (XIV, 220 pages) , 37 illustrations
    ISBN: 9783319577357
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Management ; Industrial management ; Information storage and retrieval ; Application software ; Computers and civilization ; Computer Science ; Information Storage and Retrieval ; Innovation/Technology Management ; Computer Applications ; Computers and Society
    Description / Table of Contents: Part I: The Big Data Opportunity --- The Big Data Value Opportunity --- Introduction to the BIG Project --- Part II: The Big Data Value Chain: Enabling and Value Creating Technologies --- The Big Data Value Chain: Definitions, Concepts, and Theoretical Approaches --- Big Data Acquisition --- Big Data Analysis --- Big Data Curation --- Big Data Storage --- Big Data Usage --- Part III: Usage and Exploitation of Big Data --- Big Data Driven Innovation in Industrial Sectors --- Big Data in the Health Sector --- Big Data in the Public Sector --- Big Data in the Finance and Insurance Sectors --- Big Data in the Energy and Transport Sectors --- Big Data in the Media and Entertainment Sectors --- Part IV: A Roadmap for Big Data Research --- Cross-Sectorial Requirements Analysis for Big Data Research --- New Horizons for a Data-Driven Economy: Roadmaps and Action Plans for Technology, Businesses, Policy, and Society.                        
    Pages: Online-Ressource (XX, 303 pages) , 34 illustrations
    ISBN: 9783319215693
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Common challenges with software --- The map --- A holistic view to change --- The compass --- The journeys --- Co-develop in a community --- Charing is caring --- A thriving Open Source culture behind the wall --- Keeping the doors open.- Building ecosystems --- Pushing the boundaries --- Add supplementary services --- Adding Internet to things --- Boosting product sales by services --- Deliver 24/7 --- Pruning a bush --- Ensuring prima deliveries --- Pump up the volume --- Global R&D goes agile with SAFe --- Multi-site development --- Agile and disciplined --- Scaling Agile in Automotive --- Scaling Agile in Life sciences --- Outside the box --- Efficient communication --- Outsourcing Strategy at Sony Mobile --- Not so shore anymore --- Play it again, Sam, backwards --- First things first --- Robotic growing pains --- Softhouse reflects on architecture changes --- From mobile to Platform --- Your journey
    Pages: Online-Ressource (XXIII, 242 pages)
    ISBN: 9783319531168
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Unknown
    Cham : Springer
    Keywords: Computer science ; Artificial intelligence ; Algorithms ; Robotics ; Automation ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Algorithms ; Robotics and Automation
    Description / Table of Contents: Robots and their Applications --- Sensors --- Reactive Behavior --- Finite State Machines --- Robotic Motion and Odometry --- Control --- Local Navigation: Obstacle Avoidance --- Localization --- Mapping --- Mapping-based Navigation --- Fuzzy Logic Control --- Image Processing --- Neural Networks --- Machine Learning --- Swarm Robotics --- Kinematics of a Robotic Manipulator --- Appenix A:Units of Measurement --- Appendix B:Mathematical Derivations and Tutorials --- Index
    Pages: Online-Ressource (XVI, 308 pages) , 198 illustrations, 76 illustrations in color
    ISBN: 9783319625331
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Keywords: Computer science ; Management ; Industrial management ; Information technology ; Business ; Data processing ; Computers ; Computer Science ; Information Systems and Communication Service ; Innovation/Technology Management ; IT in Business
    Description / Table of Contents: Modelle --- Modellierungssprachen --- Vorgehensweise von der Modellbildung zur Digitalisierung --- Vorbereitung der Prozessimplementierung --- Umsetzung --- Praxisbeispiel
    Pages: Online-Ressource (X, 254 Seiten) , 143 Abbildungen, 69 Abbildungen in Farbe
    ISBN: 9783658226480
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Keywords: Computer science ; Health informatics ; Data mining ; Information storage and retrieval ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Information Storage and Retrieval ; Health Informatics ; Document Preparation and Text Processing ; Health Informatics ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery
    Description / Table of Contents: Introduction --- The history of the patient record and the paper record --- User needs: clinicians, clinical researchers and hospital management --- Characteristics of patient records and clinical corpora --- Medical classifications and terminologies --- Evaluation metrics and evaluation --- Basic building blocks for clinical text processing --- Computational methods for text analysis and text classification --- Ethics and privacy of patient records for clinical text mining research --- Applications of clinical text mining --- Networks and shared tasks in clinical text mining --- Conclusions and outlook --- References --- Index
    Pages: Online-Ressource (XVII, 181 pages) , 54 illustrations, 28 illustrations in color
    ISBN: 9783319785035
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Pages: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: Computer science ; Special purpose computers ; Computer security ; User interfaces (Computer systems) ; Artificial intelligence ; Image processing ; Computer Science ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Artificial Intelligence (incl. Robotics) ; Systems and Data Security ; Image Processing and Computer Vision ; Special Purpose and Application-Based Systems
    Description / Table of Contents: This book is published open access under a CC BY license. This book constitutes the proceedings of the 5th International Workshop on Symbiotic Interaction, Symbiotic 2016, held in Padua, Italy, in October 2016. The 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The idea of symbiotic systems put forward in this workshop capitalizes on the computers’ ability to implicitly detect the users goals, preferences or/and psycho-physiological states and thereby enhancing human-computer interaction (HCI). The papers present an overview of the symbiotic relationships between humans and computers with emphasis on user-driven research on symbiotic systems, adaptive systems, implicit input data, physiological computing and BCI, but also on understanding the nature of the interdependence and agency between computers and humans more broadly
    Pages: Online-Ressource (XIV, 182 pages) , 51 illustrations
    ISBN: 9783319577531
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Keywords: Computer science ; Computer communication systems ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers and civilization ; Computer Science ; Computer Communication Networks ; Systems and Data Security ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation ; Computers and Society ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Making Flow-Based Security Detection Parallel --- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts --- Achieving Reproducible Network Environments with INSALATA --- Towards a Software-Defined Security Framework for Supporting Distributed Cloud --- Optimal Service Function Chain Composition in Network Functions Virtualization --- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services --- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications --- Towards Internet Scale Quality-of-Experience Measurement with Twitter --- Hunting SIP Authentication Attacks Efficiently --- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks --- Flow-Based Detection of IPv6-specific Network Layer Attacks --- Towards a Hybrid Cloud Platform Using Apache Mesos --- Visual Analytics for Network Security and Critical Infrastructures --- Preserving Relations in Parallel Flow Data Processing --- SmartDEMAP: A Smart Contract Deployment and Management Platform --- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads --- Situational Awareness: Detecting Critical Dependencies and Devices in a Network --- A Framework for SFC Integrity in NFV Environments --- Multi-domain DDoS Mitigation based on Blockchains
    Pages: Online-Ressource (XX, 192 pages) , 55 illustrations
    ISBN: 9783319607740
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Management information systems ; Industrial management ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business Process Management ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Introduction --- The Problem - Part I --- The Solution --- Transition --- The Problem - Part II --- The Solution - Part II --- Transition - Part II --- The Problem - Part III --- The Solution - Part III --- Transition - Part III --- The Problem, The Solution and The End - Final Part --- Troubleshooting
    Pages: Online-Ressource (X, 143 pages) , 210 illustrations in color
    ISBN: 9783642369049
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: 1 Introduction --- Part I Business Operation Support --- 2 Subject-Oriented Business Processes Meet Strategic Management: Two Case Studies from the Manufacturing Industry --- 3 Communication- and Value-Based Organizational Development at the University Clinic for Radiotherapy-Radiation Oncology --- 4 Introducing S-BPM at an IT Service Providers --- 5 A Service Hardware Application Case Fiducia --- 6 Designing an Agile Process Layer for Competitive Differentiation --- Part II Consultancy and Education Support --- 7 Model as You Do: Engaging an S-BPM Vendor on Process Modelling in 3D Virtual Worlds --- 8 A Tangible Modeling Interface for Subject-Oriented Business Process Management --- 9 A Reference Model for Maintenance Processes --- 10 Role and Rights Management --- 11 Embodying Business Rules in S-BPM --- 12 Agents Implementing Subject Behaviour: A Manufacturing Scenario --- Part III Technical Execution Support --- 13 An Abstract State Machine Interpreter for S-BPM --- 14 Structured Communication—Approaching S-BPM with Microsoft Technologies --- 15 ERP Integration in S-BPM Processes
    Pages: Online-Ressource (XIV, 283 pages) , 134 illustrations
    ISBN: 9783319175423
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Keywords: Computer science ; Data structures (Computer science) ; User interfaces (Computer systems) ; Application software ; Computers ; Computer Science ; History of Computing ; Computer Appl. in Arts and Humanities ; Data Structures ; User Interfaces and Human Computer Interaction
    Description / Table of Contents: Part I: Artistic Contributions --- The Computer Age --- Odes to Ted Nelson --- Part II: Peer Histories --- The Two-eyed Man --- Ted Nelson’s Xanadu—Caution: Four Letter Words Ahead --- Hanging Out with Ted Nelson --- Riffing on Ted Nelson—Hypermind --- Intertwingled Inspiration --- An Advanced Book for Beginners --- Part III: Hypertext and Ted Nelson-Influenced Research --- The Importance of Ted’s Vision --- Data, Metadata and Ted --- Making Links: Everything Really is Deeply Intertwingled --- Ted Nelson --- History Debugged --- We Can and Must Understand Computers NOW --- The Future of Transclusion --- Ted Nelson: A Critical (and Critically Incomplete) Bibliography --- Part IV: The Last Word --- What Box?
    Pages: Online-Ressource (XVI, 150 pages) , 43 illustrations
    ISBN: 9783319169255
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Keywords: Computer science ; Research ; Moral and ethical aspects ; Computers ; Computers and civilization ; Computer Science ; Computers and Society ; History of Computing ; Diversity Management/Women in Business ; Research Ethics
    Description / Table of Contents: Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science --- On the Big Impact of “Big Computer Science” --- On Informatics, Diamonds and T --- Leadership and Balance in Research --- Rational ethics --- Ethics for the digital age: where are the moral specs? --- Digital Sovereignty and IT-Security for a Prosperous Society --- Women in Computing and the contingency of informatics cultures --- Ada - poet of computing
    Pages: Online-Ressource (XI, 109 pages) , 22 illustrations in color
    ISBN: 9783319557359
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Improving Agile Processes --- Reflection in Agile Retrospectives --- What influences the speed of prototyping? An empirical investigation of twenty software startups --- Key Challenges in Agile Requirements Engineering --- A Multiple Case Study on Selecting a Technique for User-Interaction Data Collecting --- Comparing Requirements Decomposition within the Scrum, Scrum with Kanban, XP, and Banana Development Processes --- Effects of Technical Debt Awareness: A classroom study --- Agile in Organizations --- Don’t Forget to Breathe: A Controlled Trial of Mindfulness Practices in Agile Project Teams --- Enhancing Agile Team Collaboration through the use of Large Digital Multi-touch Cardwalls --- Knowledge Sharing in a Large Agile Organisation: A Survey Study --- Teaching Agile Methods to Software Engineering Professionals: 10 Years, 1000 Release Plans --- Are Software Startups Applying Agile? the State of the Practice from a Large Survey --- Adopting Test Automation on Agile Development Projects: A Grounded Theory Study of Indian Software Organizations --- Safety Critical Software --- How is security testing done in agile teams? A cross-case analysis of four software teams --- An assessment of avionics software development practice: justifications for an agile development process --- Short Research Papers --- Inoculating an Agile Company with User-Centred Design: an Empirical Study --- On the Usage and Benefits of Agile Methods & Practices --- Checklists to Support Test Charter Design in Exploratory Testing --- Discovering Software Process Deviations Using Visualizations --- Exploring Workflow Mechanisms and Task Allocation Strategies in Agile Software Teams --- Are daily stand-up meetings valuable? A survey of developers in software teams --- Doctoral Symposium Papers --- Knowledge Management and Reflective Practice in Daily Stand-up and Retrospective Meetings --- Self-Assignment: Task Allocation Practice in Agile Software Development --- Software Development Practices Patterns.
    Pages: Online-Ressource (XIII, 306 pages) , 55 illustrations
    ISBN: 9783319576336
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Computational linguistics ; Computer Science ; Language Translation and Linguistics ; Computational Linguistics
    Description / Table of Contents: Key Messages --- Executive Summary --- 1.Introduction --- 2.Multilingual Europe: Facts, Challenges, Opportunities --- 3.Major Trends in Information and Communication Technologies --- 4.Language Technology 2012: Current State and Opportunities --- 5.Language Technology 2020: The META-NET Technology Vision --- 6.Language Technology 2020: Priority Research Themes --- 7.Towards a Shared European Programme for Multilingual Europe 2020: Next Steps --- A.References --- B.List of Key Contributors --- C.Milestones and History of the Strategic Research Agenda --- D.About META-NET --- E.Members of META-NET --- F.Abbreviations and Acroynms
    Pages: Online-Ressource (VIII, 87 pages) , 22 illustrations in color
    ISBN: 9783642363498
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Computer Science ; Programming Techniques
    Description / Table of Contents: The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices, such as Samsung, Lenovo, and Asus. The increase in Android devices featuring Intel processors has created a demand for Android applications optimized for Intel Architecture: Android Application Development for the Intel® Platform is the perfect introduction for software engineers and mobile app developers. Through well-designed app samples, code samples and case studies, the book teaches Android application development based on the Intel platform—including for smartphones, tablets, and embedded devices—covering performance tuning, debugging and optimization. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University
    Pages: Online-Ressource (XX, 520 pages) , 278 illustrations
    ISBN: 9781484201008
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Chapter 1 Introduction --- Chapter 2 Misperception of Risk --- Chapter 3 Governance and Internal Partnerships --- Chapter 4 External Partnerships --- Chapter 5 People Are the Perimeter --- Chapter 6 Emerging Capabilities and Usage Models --- Chapter 7 A New Security Architecture to Improve Business Agility --- Chapter 8 Looking to the Future --- Chapter 9 Corporate Social Responsibility --- Chapter 10 The 21st Century CISO --- Chapter 11 Performance Coaching --- Appendix A: References.
    Pages: Online-Ressource (XXVII, 187 pages) , 20 illustrations in color
    Edition: 2nd edition
    ISBN: 9781484214558
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations
    Pages: Online-Ressource (XXIV, 300 pages) , 74 illustrations
    ISBN: 9781430264972
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Keywords: Computer science ; Multimedia information systems ; Computer Science ; Computer Science, general ; Multimedia Information Systems
    Description / Table of Contents: Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power. The practical aspects are many: Uploading video to the Internet is only the beginning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. Digital video is frequently compressed and coded for easier storage and transmission. This process involves visual quality loss due to typical data compression techniques and requires use of high performance computing systems. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms. Trade-offs can be made among these factors, and relevant considerations are particularly important in resource-constrained low power devices. To better understand the trade-offs this book discusses a comprehensive set of engineering principles, strategies, methods and metrics. It also exposes readers to approaches on how to differentiate and rank video coding solutions
    Pages: Online-Ressource (XVII, 368 pages) , 115 illustrations
    ISBN: 9781430267133
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Management information systems ; Industrial management ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business Process Management ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Introduction --- The Problem - Part I --- The Solution --- Transition --- The Problem - Part II --- The Solution - Part II --- Transition - Part II --- The Problem - Part III --- The Solution - Part III --- Transition - Part III --- The Problem, The Solution and The End - Final Part --- Troubleshooting
    Pages: Online-Ressource (X, 143 pages) , 210 illustrations in color
    ISBN: 9783642369049
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Computational linguistics ; Computer Science ; Language Translation and Linguistics ; Computational Linguistics
    Description / Table of Contents: Key Messages --- Executive Summary --- 1.Introduction --- 2.Multilingual Europe: Facts, Challenges, Opportunities --- 3.Major Trends in Information and Communication Technologies --- 4.Language Technology 2012: Current State and Opportunities --- 5.Language Technology 2020: The META-NET Technology Vision --- 6.Language Technology 2020: Priority Research Themes --- 7.Towards a Shared European Programme for Multilingual Europe 2020: Next Steps --- A.References --- B.List of Key Contributors --- C.Milestones and History of the Strategic Research Agenda --- D.About META-NET --- E.Members of META-NET --- F.Abbreviations and Acroynms
    Pages: Online-Ressource (VIII, 87 pages) , 22 illustrations in color
    ISBN: 9783642363498
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Computers ; Computers and civilization ; Computer Science ; History of Computing ; User Interfaces and Human Computer Interaction ; Computer Appl. in Arts and Humanities ; Computers and Society
    Description / Table of Contents: Once Neglected, Now Emerging and Absolutely Necessary: On the History of Digital Humanities or An Introduction --- Why Oral History? ---  ‘Individuation is There in all the Different Strata:’ an Oral History Conversation between John Burrows, Hugh Craig and Willard McCarty --- ‘It was a Time When the University was Still Taking Account of the Meaning of universitas scientiarum’: an Oral History Conversation between Wilhelm Ott and Julianne Nyhan --- ‘hic Rhodus, hic salta’: An Oral History Interview Between Tito Orlandi and Julianne Nyhan --- ‘They Took a Chance’: An Oral History Conversation between Susan Hockey and Julianne Nyhan ---  ‘And Here We go Back Again to the Influence of Algorithmic Thinking’: An Oral History conversation between Judy Malloy and Julianne Nyhan --- ‘I Would Think of Myself as Sitting Inside the Computer, Moving Things Around in Order to Accomplish the Goal of my Programming’: An Oral History Conversation Between Mary Dee Harris and Julianne Nyhan --- ‘I Was Absolutely Convinced That There Had to be a Better Way’: An Oral History Conversation Between John Nitti and Julianne Nyhan --- ‘It’s a Little Mind-Boggling Actually’: An Oral History Conversation between Helen Agüera and Julianne Nyhan ---  ‘I Heard About the Arrival of the Computer’: An Oral History Conversation Between Hans Rutimann and Julianne Nyhan ---  ‘Langezeit habe ich der Universitaet nachgetrauert’: An Oral History Conversation between Michael Sperberg-McQueen and Julianne Nyhan.-‘It’s Probably the Only Modestly Widely used System with a Command Language in Latin’: An Oral History Conversation Between Manfred Thaller and Julianne Nyhan ---  ‘I was Keen on Getting Computers into Humanists’ Thinking’: An Oral History Conversation Between John Bradley and Julianne Nyhan ---  ‘Moderate Expectations, Tolerable Disappointments’: An Oral History Conversation between Claus Huitfeldt and Julianne Nyhan --- ‘So, Into the Chopper it Went’: An Oral History Conversation between Gabriel Egan and Julianne Nyhan --- Revolutionaries and Underdogs --- By Way of a Conclusion
    Pages: Online-Ressource (XI, 285 pages)
    ISBN: 9783319201702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Unknown
    Cham : Springer
    Keywords: Computer science ; Computer organization ; Computers ; Artificial intelligence ; Computer simulation ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Simulation and Modeling
    Description / Table of Contents: Preface --- Part I: The Concept of Anti-Fragility: 1 Introduction --- 2 Achieving Anti-Fragility --- 3 The Need to Build Trust --- 4 Principles Ensuring Anti-Fragility --- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions --- 6 An Anti-Fragile e-Government System --- 7 Anti-Fragile Cloud-Based Telecom Systems --- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading --- 9 Robustness to Malware Reinfections --- 10 Anti-Fragility to Malware Spreading --- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm --- 12 Detecting Anomalies with the CLA --- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work --- About the Author --- References --- Index
    Pages: Online-Ressource (XVIII, 151 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9783319300702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: Introduction --- Industrial Challenges. S-BPM's Industrial Capabilities --- Lot-Size One Production. People-Centred Production Design --- Human-Controlled Production --- Learnings --- The Future: Obstacles and Opportunities
    Pages: Online-Ressource (XIV, 232 pages) , 78 illustrations
    ISBN: 9783319484662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Keywords: Computer science ; Computer organization ; Software engineering ; Application software ; System theory ; Computer Science ; Computer Systems Organization and Communication Networks ; Software Engineering ; Complex Systems ; Information Systems Applications (incl. Internet) ; Computer Applications
    Description / Table of Contents: Basic concepts on systems of systems --- interfaces in evolving cyber-physical systems-of-systems --- emergence in cyber-physical systems-of-systems (CPSOSS) --- AMADEOS sysml profile for SoS conceptual modeling --- AMADEOS framework and supporting tools --- time and resilient master clocks in cyber-physical systems --- managing dynamicity in SoS --- case study definition and implementation
    Pages: Online-Ressource (XV, 257 pages) , 124 illustrations
    ISBN: 9783319475905
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Keywords: Computer science ; Computer hardware ; Computer organization ; Software engineering ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computer Systems Organization and Communication Networks ; Computing Methodologies ; Computing Milieux ; Computer Hardware
    Description / Table of Contents: Concurrent and Distributed Systems --- Computing the concurrency threshold of sound free-choice workflow nets --- Fine-Grained Complexity of Safety Verification --- Parameterized verification of synchronization in constrained reconfigurable broadcast networks --- EMME: a formal tool for the ECMAScript Memory Model Evaluation --- SAT and SMT II --- What a Difference a Variable Makes --- Abstraction Refinement for Emptiness Checking of Alternating Data Automata --- Revisiting Enumerative Instantiation --- An Non-linear Arithmetic Procedure for Control-Command Software Verification --- Security and Reactive Systems --- Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection --- Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts --- RVHyper: A Runtime Verification Tool for Temporal Hyperproperties --- The Refinement Calculus of Reactive Systems Toolset --- Static and Dynamic Program Analysis --- TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation --- Optimal Dynamic Partial Order Reduction with Observers --- Structurally Defined Conditional Data-flow Static Analysis --- Geometric Nontermination Arguments --- Hybrid and Stochastic Systems --- Efficient dynamic error reduction for hybrid systems reachability analysis --- AMT2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic --- Multi-Cost Bounded Reachability in MDPs --- A Statistical Model Checker for Nondeterminism and Rare Events --- Temporal logic and mu-calculus --- Permutation Games for the Weakly Aconjunctive mu-Calculus --- Symmetry Reduction for the Local Mu-Calculus --- Bayesian Statistical Parameter Synthesis for Linear Temporal Properties of Stochastic Models --- 7th Competition on Software Verification (SV-COMP) --- 2LS: Memory Safety and Non-Termination (Competition contribution) --- Yogar-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement (Competition Contribution) --- CPA-BAM-Slicing: Block-Abstraction Memorization and Slicing with Region-Based Dependency Analysis (Competition Contribution) --- InterpChecker: Reducing State Space via Interpolations (Competition Contribution) --- Map2Check using LLVM and KLEE (Competition Contribution) --- Symbiotic 5: Boosted Instrumentation (Competition Contribution) --- Ultimate Automizer and the Search for Perfect Interpolants (Competition Contribution) --- Ultimate Taipan with Dynamic Block Encoding (Competition Contribution) --- VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)
    Pages: Online-Ressource (XX, 465 pages) , 92 illustrations
    ISBN: 9783319899633
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Data encryption (Computer science) ; Computer Science ; Security ; Information Systems Applications (incl. Internet) ; Data Encryption ; Special Purpose and Application-Based Systems ; Computer Communication Networks
    Description / Table of Contents: Security of distributed interconnected systems --- Security of software systems --- Security of the Internet of Things
    Pages: Online-Ressource (XII, 159 pages) , 33 illustrations
    ISBN: 9783319951898
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Computer system failures ; Coding theory ; E-commerce ; Computer Science ; Computer Communication Networks ; System Performance and Evaluation ; Special Purpose and Application-Based Systems ; Information Systems Applications (incl. Internet) ; Coding and Information Theory ; e-Commerce/e-business
    Description / Table of Contents: State-of-the-Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services --- Context Monitoring for Improved System Performance and QoE --- QoE Management for Future Networks --- Scalable Traffic Quality and System Efficiency Indicators towards Overall Telecommunication System's QoE Management --- Lag Compensation for First Person Shooter Games in Cloud Gaming --- The Value of Context-awareness in Bandwidth-challenging HTTP Adaptive Streaming Scenarios --- Conceptual and Analytical Models for Predicting the Quality of Service of Overall Telecommunication Systems --- QoS-based Elasticity for Service Chains in Distributed Edge Cloud Environments --- Integrating SDN and NFV with QoS-aware Service Composition --- Energy vs. QoX Network- and Cloud Services Management --- Traffic Management for Cloud Federation --- Efficient Simulation of IoT Cloud Use Cases --- Security of Internet of Things for Reliable Internet of Services --- TCP performance over current cellular access: A comprehensive analysis
    Pages: Online-Ressource (XVI, 401 pages) , 120 illustrations
    ISBN: 9783319904153
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Agile requirements --- COSMIC User Story Standard --- Improving Mockup-based Requirement Specification with End-User Annotations --- Agile testing --- Combining STPA and BDD for Safety Analysis and Verification in Agile Development: A Controlled Experiment --- Software tester, we want to hire you! An analysis of the demand for soft skills --- Developers' initial perceptions on TDD practice: A thematic analysis with distinct domains and languages --- Myths and Facts about Static Application Security Testing Tools: An Action Research at Telenor Digital --- Automated Acceptance Tests as Software Requirements: An Experiment to Compare the Applicability of Fit tables and Gherkin Language --- Agile transformation --- Interface Problems of Agile in a Non-Agile Environment --- Enterprise agility: Why is transformation so hard? --- Technical and Organizational Agile Practices: A Latin-American Survey --- Agile Software Development { Adoption & Maturity: An Activity Theory Perspective --- Scaling agile --- Do Agile Methods Work for Large Software Projects? --- Learning in the Large - An Exploratory Study of Retrospectives in Large-Scale Agile Development --- Reporting in Agile Portfolio Management: Routines, Metrics and Artefacts to Maintain an Effective Oversight --- Inter-team Coordination in Large-Scale Agile Development: A Case Study of Three Enabling Mechanisms --- Supporting Large-Scale Agile Development with Domain-driven Design --- Towards Agile Scalability Engineering --- Human-centric agile --- Stress in Agile Software Development: Practices and Outcomes --- Teamwork quality and team performance: Exploring differences between small and large agile projects --- Continuous experimentation --- Challenges and Strategies for Undertaking Continuous Experimentation to Embedded Systems: Industry and Research Perspectives --- ICOs overview: should investors choose an ICO developed with the Lean Startup methodology?
    Pages: Online-Ressource (XV, 309 pages) , 50 illustrations
    ISBN: 9783319916026
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XIX, 703 pages) , 146 illustrations
    ISBN: 9783319961453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Keywords: Computer science ; Computer graphics ; Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Introduction --- System Theory --- Image Processing --- Endoscopy --- Microscopy --- Magnetic Resonance Imaging --- X-ray Imaging --- Computed Tomography --- X-ray Phase Contrast: Research on a Future Imaging Modality --- Emission Tomography --- Ultrasound --- Optical Coherence Tomography --- Acronyms.
    Pages: Online-Ressource (X, 259 pages) , 167 illustrations
    ISBN: 9783319965208
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XX, 545 pages) , 106 illustrations
    ISBN: 9783319961422
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It also examines the source code-level optimizations that can be performed to exploit the powerful features of the processor. Xeon Phi is at the heart of world’s fastest commercial supercomputer, which thanks to the massively parallel computing capabilities of Intel Xeon Phi processors coupled with Xeon Phi coprocessors attained 33.86 teraflops of benchmark performance in 2013. Extracting such stellar performance in real-world applications requires a sophisticated understanding of the complex interaction among hardware components, Xeon Phi cores, and the applications running on them. In this book, Rezaur Rahman, an Intel leader in the development of the Xeon Phi coprocessor and the optimization of its applications, presents and details all the features of Xeon Phi core design that are relevant to the practice of application developers, such as its vector units, hardware multithreading, cache hierarchy, and host-to-coprocessor communication channels. Building on this foundation, he shows developers how to solve real-world technical computing problems by selecting, deploying, and optimizing the available algorithms and data structure alternatives matching Xeon Phi’s hardware characteristics. From Rahman’s practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel
    Pages: Online-Ressource (XXI, 232 pages)
    ISBN: 9781430259275
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel’s x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 devices. The fundamental idea is that extending your applications to support x86 or creating new ones is not difficult, but it is imperative to know all of the technicalities. This book is dedicated to providing you with an awareness of these nuances and an understanding of how to tackle them. Second, and most importantly, this book provides a one-stop detailed resource for best practices and procedures associated with the installation issues, hardware optimization issues, software requirements, programming tasks, and performance optimizations that emerge when developers consider the x86 Android devices. Optimization discussions dive into native code, hardware acceleration, and advanced profiling of multimedia applications. The authors have collected this information so that you can use the book as a guide for the specific requirements of each application project. This book is not dedicated solely to code; instead it is filled with the information you need in order to take advantage of x86 architecture. It will guide you through installing the Android SDK for Intel Architecture, help you understand the differences and similarities between processor architectures available in Android devices, teach you to create and port applications, debug existing x86 applications, offer solutions for NDK and C++ optimizations, and introduce the Intel Hardware Accelerated Execution Manager. This book provides the most useful information to help you get the job done quickly while utilizing best practices
    Pages: Online-Ressource (XXVII, 380 pages) , 180 illustrations
    ISBN: 9781430261315
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Keywords: Computer science ; Artificial intelligence ; Computer Science ; Artificial Intelligence (incl. Robotics)
    Description / Table of Contents: Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of machine learning, including knowledge discovery, classifications, genetic algorithms, neural networking, kernel methods, and biologically-inspired techniques. Mariette Awad and Rahul Khanna’s synthetic approach weaves together the theoretical exposition, design principles, and practical applications of efficient machine learning. Their experiential emphasis, expressed in their close analysis of sample algorithms throughout the book, aims to equip engineers, students of engineering, and system designers to design and create new and more efficient machine learning systems. Readers of Efficient Learning Machines will learn how to recognize and analyze the problems that machine learning technology can solve for them, how to implement and deploy standard solutions to sample problems, and how to design new systems and solutions. Advances in computing performance, storage, memory, unstructured information retrieval, and cloud computing have coevolved with a new generation of machine learning paradigms and big data analytics, which the authors present in the conceptual context of their traditional precursors. Awad and Khanna explore current developments in the deep learning techniques of deep neural networks, hierarchical temporal memory, and cortical algorithms. Nature suggests sophisticated learning techniques that deploy simple rules to generate highly intelligent and organized behaviors with adaptive, evolutionary, and distributed properties. The authors examine the most popular biologically-inspired algorithms, together with a sample application to distributed datacenter management. They also discuss machine learning techniques for addressing problems of multi-objective optimization in which solutions in real-world systems are constrained and evaluated based on how well they perform with respect to multiple objectives in aggregate. Two chapters on support vector machines and their extensions focus on recent improvements to the classification and regression techniques at the core of machine learning
    Pages: Online-Ressource (XIX, 268 pages) , 88 illustrations
    ISBN: 9781430259909
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing.  It discusses the social, regulatory, and design considerations specific to these domains. The book provides an application-based approach using real-world examples to illustrate the application of sensor technologies in a practical and experiential manner. The book  guides the reader from the formulation of the research question, through the design and validation process, to the deployment and management phase of sensor applications.  The processes and examples used in the book are primarily based on research carried out by Intel or joint academic research programs. "Sensor Technologies: Healthcare, Wellness and Environmental Applications provides an extensive overview of sensing technologies and their applications in healthcare, wellness, and environmental monitoring. From sensor hardware to system applications and case studies, this book gives readers an in-depth understanding of the technologies and how they can be applied. I would highly recommend it to students or researchers who are interested in wireless sensing technologies and the associated applications." Dr. Benny Lo Lecturer, The Hamlyn Centre, Imperial College of London     "This timely addition to the literature on sensors covers the broad complexity of sensing, sensor types, and the vast range of existing and emerging applications in a very clearly written and accessible manner.  It is particularly good at capturing the exciting possibilities that will occur as sensor networks merge with cloud-based ‘big data’ analytics to provide a host of new applications that will impact directly on the individual in ways we cannot fully predict at present.  It really brings this home through the use of carefully chosen case studies that bring the overwhelming concept of 'big data' down to the personal level of individual life and health."   Dermot Diamond Director, National Centre for Sensor Research, Principal Investigator, CLARITY Centre for Sensor Web Technologies, Dublin City University                                                                      "Sensor Technologies: Healthcare, Wellness and Environmental Applications takes the reader on an end-to-end journey of sensor technologies, covering the fundamentals from an engineering perspective, introducing how the data gleaned can be both processed and visualized, in addition to offering exemplar case studies in a number of application domains.  It is a must-read for those studying any undergraduate course that involves sensor technologies.  It also provides a thorough foundation for those involved in the research and development of applied sensor systems.  I highly recommend it to any engineer who wishes to broaden their knowledge in this area!" Chris Nugent Professor of Biomedical Engineering, University of Ulster  
    Pages: Online-Ressource (XXV, 336 pages) , 108 illustrations
    ISBN: 9781430260141
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Programming languages (Electronic computers) ; Computer Science ; Programming Techniques ; Programming Languages, Compilers, Interpreters
    Description / Table of Contents: The book is great! It's clear and easy to read, with loads of examples that showed my students what to do. -- Larry Snyder, Emeritus Professor, University of Washington, Department of Computer Science and Engineering "Having the TouchDevelop book available made our events so much easier. Students could figure things out for themselves with help from the book." -- Jennifer Marsman, Microsoft Principal Developer Evangelist Mobile devices such as smartphones and tablets are set to become the main computers that virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at Microsoft Research was created to answer a simple question: "It is possible to create interesting apps directly on a smartphone or tablet, without using a separate PC or a keyboard?" The result is TouchDevelop, a programming environment that runs on all modern mobile devices such as Windows Phone, iPhone, iPad, Android phones and tablets, and also on PCs and Macs. This book walks you through all of the screens of the TouchDevelop app, and it points out similarities and differences of the TouchDevelop language compared to other programming languages. For users, the book can serve as a handyreference next to the phone. The book systematically addresses all programming language constructs, starting from the very basic constructs such as variables and loops. The book also explores many of the phone sensors and data sources which make creating apps for mobile devices so rewarding. If you are new to programming with TouchDevelop, or if you have not yet worked on touchscreen devices, we suggest that you read the book starting from Chapter 1. If you are already familiar with the basic paradigm of the TouchDevelop programming environment, then feel free to jump ahead to the later chapters that address particular topic areas. This book is written from the perspective of a person developing their code using a web browser. The TouchDevelop Web App runs in many modern browsers on many different devices including smartphones and tablets, Macs, PC. All screenshots and navigation instructions refer to the TouchDevelop Web App running in a browser. For Windows Phone, there is a dedicated TouchDevelop app in the Windows Phone Store which gives access to many more sensors and data sources. Starting with the TouchDevelop app v3.0 for Windows Phone 8, the phone app will share the same look and navigation structure and all features of the Web App
    Pages: Online-Ressource (XIX, 270 pages) , 69 illustrations
    Edition: 3rd edition
    ISBN: 9781430261377
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Keywords: Computer science ; Data encryption (Computer science) ; Database management ; Computer Science ; Data Encryption ; Database Management
    Description / Table of Contents: This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!   John McAuley,EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud."   Alex Rodriguez,  Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk."   Pete Nicoletti. Virtustream Inc. Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools. With a foreword from Albert Caballero, the CTO at Trapezoid
    Pages: Online-Ressource (XVII, 156 pages) , 56 illustrations
    ISBN: 9781430261490
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications
    Pages: Online-Ressource (XVI, 356 pages) , 104 illustrations
    ISBN: 9781430261582
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Keywords: Computer science ; Computer organization ; Computers ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service
    Description / Table of Contents: Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers
    Pages: Online-Ressource (XXI, 360 pages) , 103 illustrations
    ISBN: 9781430266389
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Keywords: Computer science ; Microprogramming ; Computer Science ; Computer Science, general ; Control Structures and Microprogramming
    Description / Table of Contents: Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel’s new firmware direction (including Quark coverage), showing how to integrate Intel® Architecture designs into their plans. Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization
    Pages: Online-Ressource (XXIII, 224 pages) , 68 illustrations
    ISBN: 9781484200704
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Keywords: Computer science ; Project management ; Software engineering ; Computer Science ; Software Engineering ; Project Management
    Description / Table of Contents: Part I: DevOps: Conflict to Collaboration --- Chapter 1: DevOps in the Ascendency --- Chapter 2: IT Impasse --- Chapter 3: DevOps Foundations --- Part II: Essential DevOps Tooling --- Chapter 4: Build: DevOps Driven APIs --- Chapter 5: Test: Championing Quality - Continuously --- Chapter 6: Deploy --- Chapter 7: Manage: Agile Operations --- Part III: Tuning and Continuous Improvement --- Chapter 8: Practical DevOps --- Chapter 9: DevOps and Real World ROI --- Chapter 10: Ready, Set, DevOps!
    Pages: Online-Ressource (XV, 173 pages) , 24 illustrations in color
    ISBN: 9781484218426
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migration details are included. Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services. Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it. The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization. This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services
    Pages: Online-Ressource (XXIX, 680 pages) , 638 illustrations
    ISBN: 9781430265276
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; User interfaces (Computer systems) ; Computer Science ; User Interfaces and Human Computer Interaction ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform
    Pages: Online-Ressource (XI, 156 pages) , 65 illustrations
    ISBN: 9781484203828
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Keywords: Computer science ; Health informatics ; Computer system failures ; Image processing ; Computer Science ; Health Informatics ; Health Informatics ; Image Processing and Computer Vision ; System Performance and Evaluation
    Description / Table of Contents: VISCERAL: Evaluation-as-a-Service for Medical Imaging --- Using the Cloud as a Platform for Evaluation and Data Preparation --- Ethical and Privacy Aspects of Using Medical Image Data --- Annotating Medical Image Data --- Datasets created in VISCERAL --- Evaluation Metrics for Medical Organ Segmentation and Lesion Detection --- VISCERAL Anatomy Benchmarks for Organ Segmentation and Landmark Localisation: Tasks and Results --- Retrieval of Medical Cases for Diagnostic Decisions: VISCERAL Retrieval Benchmark --- Automatic Atlas-Free Multi-Organ Segmentation of Contrast-Enhanced CT Scans --- Multi-organ Segmentation Using Coherent Propagating Level Set Method Guided by Hierarchical Shape Priors and Local Phase Information --- Automatic Multi-organ Segmentation using Hierarchically-Registered Probabilistic Atlases --- Multi-Atlas Segmentation Using Robust Feature-Based Registration --- Combining Radiology Images and Clinical Meta-data for Multimodal Medical Case-based Retrieval --- Text and Content-based Medical Image Retrieval in the VISCERAL Retrieval Benchmark
    Pages: Online-Ressource (XVIII, 254 pages) , 93 illustrations, 39 illustrations in color
    ISBN: 9783319496443
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Keywords: Computer science ; Special purpose computers ; Database management ; User interfaces (Computer systems) ; Artificial intelligence ; Computer Science ; Artificial Intelligence (incl. Robotics) ; User Interfaces and Human Computer Interaction ; Database Management ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Can Machines Design? Optimizing User Interfaces for Human Performance --- Geometrical Shapes Rendering on a Dot-Matrix Display --- Dynamic Hand Gesture Recognition for Mobile Systems Using Deep LSTM --- Adjustable Autonomy for UAV Supervision Applications Through Mental Workload Assessment Techniques --- Classification of Motor Imagery Based EEG Signals Using Sparsity Approach --- Mental Workload Assessment for UAV Traffic Control Using Consumer-Grade BCI Equipment --- Improving Classification Performance by Combining Feature Vectors with A Boosting Approach for Brain Computer Interface (BCI) --- List Navigation Using Edge Menu --- Simplexity and Vicariance. On Human Cognition Principles for Man-Machine Interaction --- Design Considerations for Self-paced Interactive Notes on Video Lectures - A Learner's Perspective and Enhancements of Learning Outcome --- Using Psycholinguistic Features for the Classification of Comprehenders from Summary Speech Transcripts --- Lector: Towards Reengaging Students in the Educational Process Inside Smart Classrooms --- Predicting Driver's Work Performance in Driving Simulator Based on Physiological Indices --- Interpersonal Human-Human and Human-Robot Interactions --- Exploring the Dynamics of Relationships Between Expressed and Experienced Emotions --- Standard Co-training in Multiword Expression Detection --- Comparative Study on Normalization in Emotion Recognition from Speech --- Detecting Vigilance in People Performing Continual Monitoring Task
    Pages: Online-Ressource (XVIII, 216 pages) , 78 illustrations
    ISBN: 9783319720388
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Keywords: Computer science ; Management information systems ; Computer engineering ; Economic policy ; Computer Science ; Privacy ; Computer Engineering ; Management of Computing and Information Systems ; Governance and Government ; R & D/Technology Policy
    Description / Table of Contents: 1 Introduction --- 2 Trust --- 3 What is an ICT-System? --- 4 Development of ICT Systems --- 5 Theoretical Foundation --- 6 Reverse Engineering of Code --- 7 Static Detection of Malware --- 8 Dynamic Detection Methods --- 9 Formal Methods --- 10 Software Quality and Quality Management --- 11 Containment of Untrusted Modules --- 12 Summary and Way Forward
    Pages: Online-Ressource (XIV, 116 pages) , 6 illustrations, 5 illustrations in color
    ISBN: 9783319749501
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Keywords: Computer science ; Data mining ; Artificial intelligence ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Document Preparation and Text Processing ; Artificial Intelligence (incl. Robotics) ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Reconstruction of Separable Particle Verbs in a Corpus of Spoken German --- Detecting Vocal Irony --- The Devil is in the Details: Parsing Unknown German Words --- Exploring Ensemble Dependency Parsing to Reduce Manual Annotation Workload --- Different German and English Co-reference Resolution Models for Multi-Domain Content Curation Scenarios --- Word and Sentence Segmentation in German: Overcoming Idiosyncrasies in the Use of Punctuation in Private Communication --- Fine-Grained POS Tagging of German Social Media and Web Texts --- Developing a Stemmer for German Based on a Comparative Analysis of Publicly Available Stemmers --- Negation Modeling for German Polarity Classification --- NECKAr: A Named Entity Classifier for Wikidata --- Investigating the Morphological Complexity of German Named Entities: The Case of the GermEval NER Challenge --- Detecting Named Entities and Relations in German Clinical Reports --- In-Memory Distributed Training of Linear-Chain Conditional Random Fields with an Application to Fine-Grained Named Entity Recognition --- What does this imply? Examining the Impact of Implicitness on the Perception of Hate Speech --- Automatic Classification of Abusive Language and Personal Attacks in Various Forms of Online Communication --- Token Level Code-Switching Detection Using Wikipedia as a Lexical Resource --- How Social Media Text Analysis Can Inform Disaster Management --- A Comparative Study of Uncertainty Based Active Learning Strategies for General Purpose Twitter Sentiment Analysis with Deep Neural Networks --- An Infrastructure for Empowering Internet Users to Handle Fake News and Other Online Media Phenomena --- Different Types of Automated and Semi-automated Semantic Storytelling: Curation Technologies for Different Sectors --- Twitter Geolocation Prediction Using Neural Networks --- Diachronic Variation of Temporal Expressions in Scientific Writing Through the Lens of Relative Entropy --- A Case Study on the Relevance of the Competence Assumption for Implicature Calculation in Dialogue Systems --- Supporting Sustainable Process Documentation --- Optimizing Visual Representations in Semantic Multi-Modal Models with Dimensionality Reduction, De-noising and Contextual Information --- Using Argumentative Structure to Grade Persuasive Essays
    Pages: Online-Ressource (XIII, 310 pages) , 54 illustrations
    ISBN: 9783319737065
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Keywords: Computer science ; Logic design ; Computer organization ; Operating systems (Computers) ; Computers ; Computer Science ; Computing Methodologies ; Computer Systems Organization and Communication Networks ; Operating Systems ; Logic Design ; Information Systems and Communication Service
    Description / Table of Contents: HHVSF: A Framework to Accelerate Drug-based High-throughput Virtual Screening on High-Performance Computers --- HBasechainDB --- A Scalable Blockchain Framework on Hadoop Ecosystem --- DETOUR: A Large-Scale Non-Blocking Optical Data Center Fabric --- Querying Large Scientific Data Sets with Adaptable IO System ADIOS --- On the Performance of Spark on HPC Systems: Towards a Complete Picture --- Experiences of Converging Big Data Analytics Frameworks with High Performance Computing Systems --- MACC : An OpenACC Transpiler for Automatic Multi-GPU Use --- Acceleration of Wind Simulation using Locally Mesh-Refined Lattice Boltzmann Method on GPU-Rich supercomputers --- Architecture of an FPGA-Based Heterogeneous System for Code-Search Problems --- TINS: A Task-Based Dynamic Helper Core Strategy for In Situ Analytics --- Machine Learning Predictions for Underestimation of Job Runtime on HPC System --- A Power Management Framework with Simple DSL for Automatic Power-Performance Optimization on Power-Constrained HPC Systems --- Scalable Data Management of the Uintah Simulation Framework for Next-Generation Engineering Problems with Radiation --- High performance LOBPCG method for solving multiple eigenvalues of Hubbard model: Efficiency of communication avoiding Neumann expansion preconditioner --- Application of a preconditioned Chebyshev basis communication-avoiding conjugate gradient method to a multiphase thermal-hydraulic CFD code --- Optimization of Hierarchical matrix computation on GPU
    Pages: Online-Ressource (X, 293 pages) , 121 illustrations
    ISBN: 9783319699530
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Keywords: Computer science ; Computer system failures ; Software engineering ; Data structures (Computer science) ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Theorem Proving --- Unification with Abstraction and Theory Instantiation in Saturation-based Reasoning --- Efficient verification of imperative programs using auto2 --- Frame Inference for Inductive Entailment Proofs in Separation Logic --- Verified Model Checking of Timed Automata --- SAT and SMT I --- Chain Reduction for Binary and Zero-Suppressed Decision Diagrams --- CDCLSym: Introducing E_ective Symmetry Breaking in SAT Solving --- Automatic Generation of Precise and Useful Commutativity Conditions --- Bit-Vector Model Counting using Statistical Estimation --- Deductive Verification --- Hoare Logics for Time Bounds --- A Verified Implementation of the Bounded List Container --- Automating Deductive Verification for Weak-Memory Programs --- Software Verification and Optimisation --- Property Checking Array Programs Using Loop Shrinking --- Invariant Synthesis for Incomplete Verification Engines --- Accelerating Syntax-Guided Invariant Synthesis --- Daisy - Framework for Analysis and Optimization of Numerical Programs --- Model Checking --- Oink: an Implementation and Evaluation of Modern Parity Game Solvers --- More Scalable LTL Model Checking via Discovering Design-Space Dependencies (D^3) --- Generation of Minimum Tree-like Witnesses for Existential CTL --- From Natural Projection to Partial Model Checking and Back --- Machine Learning --- ICE-based Refinement Type Discovery for Higher-Order Functional Programs --- Strategy Representation by Decision Trees in Reactive Synthesis --- Feature-Guided Black-Box Safety Testing of Deep Neural Networks.
    Pages: Online-Ressource (XX, 429 pages) , 93 illustrations
    ISBN: 9783319899602
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Keywords: Computer science ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers ; Computer Science ; Systems and Data Security ; Theory of Computation ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Information Flow and Non-Intereference --- What's the Over/Under? Probabilistic Bounds on Information Leakage --- Secure Information Release in Timed Automata --- Compositional Non-Interference for Concurrent Programs via Separation and Framing --- The Meaning of Memory Safety --- Leakage, Information Flow, and Protocols --- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage --- Leakage and Protocol Composition in a Game-theoretic Perspective --- Equivalence Properties by Typing in Cryptographic Branching Protocols --- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience --- Smart Contracts and Privacy --- SoK: Unraveling Bitcoin Smart Contracts --- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts --- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts --- UniTraX: Protecting Data Privacy with Discoverable Biases --- Firewalls and Attack-Defense Trees --- Transcompiling Firewalls --- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Pages: Online-Ressource (XIV, 347 pages) , 85 illustrations
    ISBN: 9783319897226
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Keywords: Computer science ; Health informatics ; Data mining ; Information storage and retrieval ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Information Storage and Retrieval ; Health Informatics ; Document Preparation and Text Processing ; Health Informatics ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery
    Description / Table of Contents: Introduction --- The history of the patient record and the paper record --- User needs: clinicians, clinical researchers and hospital management --- Characteristics of patient records and clinical corpora --- Medical classifications and terminologies --- Evaluation metrics and evaluation --- Basic building blocks for clinical text processing --- Computational methods for text analysis and text classification --- Ethics and privacy of patient records for clinical text mining research --- Applications of clinical text mining --- Networks and shared tasks in clinical text mining --- Conclusions and outlook --- References --- Index
    Pages: Online-Ressource (XVII, 181 pages) , 54 illustrations, 28 illustrations in color
    ISBN: 9783319785035
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Keywords: Computer science ; Computer hardware ; Computer organization ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Programming Languages, Compilers, Interpreters ; Theory of Computation ; Computer Systems Organization and Communication Networks ; Computer Hardware ; Computing Methodologies ; Computing Milieux
    Description / Table of Contents: Language Design --- Consistent Subtyping for All --- HOBiT: Programming Lenses without using Lens Combinators --- Dualizing Generalized Algebraic Data Types by Matrix Transposition --- Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach --- Probabilistic Programming --- An Assertion-Based Program Logic for Probabilistic Programs --- Fine-grained Semantics for Probabilistic Programs --- How long, O Bayesian network, will I sample thee? --- Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus --- Types and Effects --- Failure is Not an Option: An Exceptional Type Theory --- Let Arguments Go First --- Behavioural equivalence via modalities for algebraic effects --- Explicit Effect Subtyping --- Concurrency --- A separation logic for a promising semantics --- Logical Reasoning for Disjoint Permissions --- Deadlock-Free Monitors --- Fragment Abstraction for Concurrent Shape Analysis --- Security --- Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management --- Modular Product Programs --- Program Verification --- A Fistful of Dollars: Formalizing Asymptotic Complexity Claims via Deductive Program Verification --- Verified Learning Without Regret --- Program Verification by Coinduction --- Velisarios: Byzantine Fault Tolerant Protocols Powered by Coq --- Program Analysis and Automated Verification --- Evaluating Design Tradeoffs in Numeric Static Analysis for Java --- An Abstract Interpretation Framework for Input Data Usage --- Higher-Order Program Verification via HFL Model Checking --- Quantitative Analysis of Smart Contracts --- Session Types and Concurrency --- Session-Typed Concurrent Contracts --- A Typing Discipline for Statically Verified Crash Failure Handling in Distributed Systems --- On Polymorphic Sessions and Functions: A Tale of Two (Fully Abstract) Encodings --- Concurrent Kleene Algebra: Free Model and Completeness --- Concurrency and Distribution --- Correctness of a Concurrent Object Collector for Actor Languages --- Paxos Consensus, Deconstructed and Abstracted --- On Parallel Snapshot Isolation and Release/Acquire Consistency --- Eventual Consistency for CRDTs --- Compiler Verification --- A Verified Compiler from Isabelle/HOL to CakeML --- Compositional Verification of Compiler Optimisations on Relaxed Memory
    Pages: Online-Ressource (XVI, 1058 pages) , 276 illustrations
    ISBN: 9783319898841
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Keywords: Computer science ; Computer organization ; Computer Science ; Computer Science, general ; Computer Systems Organization and Communication Networks
    Description / Table of Contents: Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources. Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - "chirps". Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things must evolve now by incorporating simpler protocols toward at the edges of the network, or remain forever inefficient. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored
    Pages: Online-Ressource (XXVI, 192 pages) , 75 illustrations
    ISBN: 9781430257417
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2024-04-14
    Description: In September 2020, researchers from Armenia, Chile, Germany and Japan met at the American University of Armenia for a virtual conference to discuss technologies with applications in smart cities, data science and information theory approaches for intelligent systems, technical challenges for intelligent environments, smart human centered computing, artificial neural networks, and deep learning. This book presents their contributions to the 2nd CODASSCA workshop on collaborative technologies and data science in artificial intelligence applications, a highly topical issue in today's computer science.
    Keywords: Computers ; Computer Science ; Technology & Engineering ; Telecommunications ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJK Communications engineering / telecommunications
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    facet.materialart.
    Unknown
    Taylor & Francis
    Publication Date: 2024-04-14
    Description: Drawing on the authors’ more than six years of R&D in location-based information systems as well as their participation in defining the Java ME Location API 2.0, this text describes the technical components needed to create location-based services with an emphasis on nonproprietary, freely available solutions that work across different technologies and platforms. Each chapter presents a general real-time tracking system example that can be easily adapted to target any application domain and that can incorporate other sensor data to make the system "participatory sensing" or "human-centric sensing." A companion website offers many supporting materials.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    facet.materialart.
    Unknown
    Springer Nature | Palgrave Macmillan
    Publication Date: 2021-02-10
    Description: This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.
    Keywords: Innovation/Technology Management ; Big Data/Analytics ; Security ; e-Commerce/e-business ; Business and Management ; IT in Business ; Computer Science ; e-Commerce and e-Business ; GDPR ; Data regulation ; accountability ; ethics in computing ; HIPAA ; it ; information management ; internet ; open access ; Research & development management ; Industrial applications of scientific research & technological innovation ; Business mathematics & systems ; Computer security ; Business applications ; E-commerce: business aspects ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJM Management & management techniques::KJMV Management of specific areas::KJMV6 Research & development management ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJQ Business mathematics & systems ; bic Book Industry Communication::U Computing & information technology::UR Computer security ; bic Book Industry Communication::U Computing & information technology::UF Business applications
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    facet.materialart.
    Unknown
    University of Minnesota Press
    Publication Date: 2024-04-14
    Description: A complete history and theory of internet daemons brings these little-known-but very consequential-programs into the spotlight We're used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net's infrastructure-as well as the devices we use to access it-daemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives-including their role in hot-button issues like network neutrality. Going back to Victorian times and the popular thought experiment Maxwell's Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcast's efforts to control peer-to-peer networking, and Pirate Bay's attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users. Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight.
    Keywords: Computer Science ; Science & Technology Studies ; History of Science & Technology ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-11
    Description: "Somewhere, there is always wind blowing or the sun shining." This maxim could lead the global shift from fossil to renewable energy sources, suggesting that there is enough energy available to be turned into electricity. But the already impressive numbers that are available today, along with the European Union's 20-20-20 goal – to power 20% of the EU energy consumption from renewables until 2020 –, might mislead us over the problem that the go-to renewables readily available rely on a primary energy source mankind cannot control: the weather. At the same time, the notion of the smart grid introduces a vast array of new data coming from sensors in the power grid, at wind farms, power plants, transformers, and consumers. The new wealth of information might seem overwhelming, but can help to manage the different actors in the power grid. This book proposes to view the problem of power generation and distribution in the face of increased volatility as a problem of information distribution and processing. It enhances the power grid by turning its nodes into agents that forecast their local power balance from historical data, using artificial neural networks and the multi-part evolutionary training algorithm described in this book. They pro-actively communicate power demand and supply, adhering to a set of behavioral rules this book defines, and finally solve the 0-1 knapsack problem of choosing offers in such a way that not only solves the disequilibrium, but also minimizes line loss, by elegant modeling in the Boolean domain. The book shows that the Divide-et-Impera approach of a distributed grid control can lead to an efficient, reliable integration of volatile renewable energy sources into the power grid.
    Keywords: Technology & Engineering ; Construction ; Computers ; Computer Science ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-14
    Description: The Simplex algorithm is one of the most important algorithms in discrete optimization, and is the most used algorithm for solving linear programs in practice. In the last 50 years, several pivot rules for this algorithm have been proposed and studied. For most deterministic pivot rules, exponential lower bounds were found, while a probabilistic pivot rule exists that guarantees termination in expected subexponential time. One deterministic pivot rule that is of special interest is Zadeh's pivot rule since it was the most promising candidate for a polynomial pivot rule for a long time. In 2011, Friedmann proved that this is not true by providing an example forcing the Simplex algorithm to perform at least a subexponential number of iterations in the worst case when using Zadeh's pivot rule. Still, it was not known whether Zadeh's pivot rule might achieve subexponential worst case running time. Next to analyzing Friedmann's construction in detail, we develop the first exponential lower bound for Zadeh's pivot rule. This closes a long-standing open problem by ruling out this pivot rule as a candidate for a deterministic, subexponential pivot rule in several areas of linear optimization and game theory.
    Keywords: Computers ; Computer Science ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    facet.materialart.
    Unknown
    Taylor & Francis | CRC Press
    Publication Date: 2024-04-14
    Description: This book is the first to combine coverage of fuzzy logic and Semantic Web languages. It provides in-depth insight into fuzzy Semantic Web languages for non-fuzzy set theory and fuzzy logic experts. It also helps researchers of non-Semantic Web languages get a better understanding of the theoretical fundamentals of Semantic Web languages. The first part of the book covers all the theoretical and logical aspects of classical (two-valued) Semantic Web languages. The second part explains how to generalize these languages to cope with fuzzy set theory and fuzzy logic.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-04
    Description: The book serves both as a reference for various scaled models with corresponding dimensionless numbers, and as a resource for learning the art of scaling. A special feature of the book is the emphasis on how to create software for scaled models, based on existing software for unscaled models. Scaling (or non-dimensionalization) is a mathematical technique that greatly simplifies the setting of input parameters in numerical simulations. Moreover, scaling enhances the understanding of how different physical processes interact in a differential equation model. Compared to the existing literature, where the topic of scaling is frequently encountered, but very often in only a brief and shallow setting, the present book gives much more thorough explanations of how to reason about finding the right scales. This process is highly problem dependent, and therefore the book features a lot of worked examples, from very simple ODEs to systems of PDEs, especially from fluid mechanics. The text is easily accessible and example-driven. The first part on ODEs fits even a lower undergraduate level, while the most advanced multiphysics fluid mechanics examples target the graduate level. The scientific literature is full of scaled models, but in most of the cases, the scales are just stated without thorough mathematical reasoning. This book explains how the scales are found mathematically. This book will be a valuable read for anyone doing numerical simulations based on ordinary or partial differential equations.
    Keywords: Ordinary Differential Equations ; Partial Differential Equations ; Mathematical Modeling and Industrial Mathematics ; Computational Science and Engineering ; Simulation and Modeling ; Analysis ; Computer Science ; scaling ; non-dimensionalization ; dimensionless numbers ; fluid mechanics ; multiphysics models ; Differential calculus & equations ; Mathematical modelling ; Maths for engineers ; Maths for scientists ; Computer modelling & simulation ; thema EDItEUR::P Mathematics and Science::PB Mathematics::PBK Calculus and mathematical analysis::PBKJ Differential calculus and equations ; thema EDItEUR::P Mathematics and Science::PB Mathematics::PBW Applied mathematics::PBWH Mathematical modelling ; thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDE Maths for scientists ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    facet.materialart.
    Unknown
    Springer Nature | Springer Singapore
    Publication Date: 2024-04-11
    Description: This open access book is a compilation of selected papers from 2020 DigitalFUTURES—The 2nd International Conference on Computational Design and Robotic Fabrication (CDRF 2020). The book focuses on novel techniques for computational design and robotic fabrication. The contents make valuable contributions to academic researchers, designers, and engineers in the industry. As well, readers will encounter new ideas about understanding intelligence in architecture.
    Keywords: Robotics and Automation ; Computer-Aided Engineering (CAD, CAE) and Design ; Simulation and Modeling ; Robotics ; Control, Robotics, Automation ; Computer Science ; Post-humanist Intelligence ; Computational Design ; Robotic Fabrication ; Human-Machine Collaboration ; AI in Architecture ; Open Access ; Computer-aided design (CAD) ; Computer modelling & simulation ; Artificial intelligence ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering::TJFM1 Robotics ; thema EDItEUR::U Computing and Information Technology::UG Graphical and digital media applications::UGC Computer-aided design (CAD) ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/png
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2024-04-14
    Description: In this concise yet comprehensive Open Access textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems (CPS). Using modeling as a way to develop deeper understanding of the computational and physical components of these systems, one can express new designs in a way that facilitates their simulation, visualization, and analysis. Concepts are introduced in a cross-disciplinary way. Leveraging hybrid (continuous/discrete) systems as a unifying framework and Acumen as a modeling environment, the book bridges the conceptual gap in modeling skills needed for physical systems on the one hand and computational systems on the other. In doing so, the book gives the reader the modeling and design skills they need to build smart, IT-enabled products. Starting with a look at various examples and characteristics of Cyber-Physical Systems, the book progresses to explain how the area brings together several previously distinct ones such as Embedded Systems, Control Theory, and Mechatronics. Featuring a simulation-based project that focuses on a robotics problem (how to design a robot that can play ping-pong) as a useful example of a CPS domain, Cyber-Physical Systems: A Model-Based Approach demonstrates the intimate coupling between cyber and physical components, and how designing robots reveals several non-trivial control problems, significant embedded and real-time computation requirements, and a need to consider issues of communication and preconceptions.
    Keywords: Computer Systems Organization and Communication Networks ; Cyber-physical systems, IoT ; Simulation and Modeling ; Control, Robotics, Mechatronics ; Computer Engineering and Networks ; Cyber-Physical Systems ; Computer Science ; Control, Robotics, Automation ; CPS ; Embedded System ; model-based engineering ; hybrid systems ; Acumen ; coordinate transformations ; modeling computational systems ; modeling physical systems ; control ; sensing and actuation ; game theory ; Open Access ; Computer networking & communications ; Electrical engineering ; Cybernetics & systems theory ; Computer modelling & simulation ; Automatic control engineering ; Electronic devices & materials ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THR Electrical engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    facet.materialart.
    Unknown
    Taylor & Francis | Routledge
    Publication Date: 2024-04-14
    Description: This book introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the book shows how to model the social network using spectral embedding. It also shows how to compose the techniques so that multiple edge semantics can be modeled together. The modeling techniques are then applied to a range of datasets to show how they can produce results that are useful in understanding real-world social networks.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBW Internet: general works
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-14
    Description: This is an open access book. Statistical machine learning (ML) has triggered a renaissance of artificial intelligence (AI). While the most successful ML models, including Deep Neural Networks (DNN), have developed better predictivity, they have become increasingly complex, at the expense of human interpretability (correlation vs. causality). The field of explainable AI (xAI) has emerged with the goal of creating tools and models that are both predictive and interpretable and understandable for humans. Explainable AI is receiving huge interest in the machine learning and AI research communities, across academia, industry, and government, and there is now an excellent opportunity to push towards successful explainable AI applications. This volume will help the research community to accelerate this process, to promote a more systematic use of explainable AI to improve models in diverse applications, and ultimately to better understand how current explainable AI methods need to be improved and what kind of theory of explainable AI is needed. After overviews of current methods and challenges, the editors include chapters that describe new developments in explainable AI. The contributions are from leading researchers in the field, drawn from both academia and industry, and many of the chapters take a clear interdisciplinary approach to problem-solving. The concepts discussed include explainability, causability, and AI interfaces with humans, and the applications include image processing, natural language, law, fairness, and climate science.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQM Machine learning
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...