ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (66)
  • Information Systems and Communication Service
  • Software engineering
Collection
Language
Years
  • 1
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XX, 545 pages) , 106 illustrations
    ISBN: 9783319961422
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Computer organization ; Computers ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service
    Description / Table of Contents: Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers
    Pages: Online-Ressource (XXI, 360 pages) , 103 illustrations
    ISBN: 9781430266389
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Berkeley, CA : Apress
    Keywords: Open source software ; Computer programming ; Software engineering ; Open Source ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented version control is a necessity for successful web projects, whether large or small. With this book you’ll learn how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet your every need. Written by Git pros Scott Chacon and Ben Straub, Pro Git (Second Edition) builds on the hugely successful first edition, and is now fully updated for Git version 2.0, as well as including an indispensable chapter on GitHub. It’s the best book for all your Git needs
    Pages: Online-Ressource (XXI, 456 pages) , 208 illustrations
    Edition: 2nd edition
    ISBN: 9781484200766
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; User interfaces (Computer systems) ; Computer Science ; User Interfaces and Human Computer Interaction ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform
    Pages: Online-Ressource (XI, 156 pages) , 65 illustrations
    ISBN: 9781484203828
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Mathematics ; Computer programming ; Software engineering ; Computer mathematics ; Mathematics ; Computational Science and Engineering ; Programming Techniques ; Software Engineering ; Numerical and Computational Physics, Simulation ; Mathematical and Computational Engineering
    Description / Table of Contents: Preface --- Algorithms and implementations --- Analysis --- Generalizations --- Models --- Scientific Software Engineering --- References --- Index.
    Pages: Online-Ressource (XIV, 200 pages) , 29 illustrations
    ISBN: 9783319294391
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Keywords: Computer science ; Project management ; Software engineering ; Computer Science ; Software Engineering ; Project Management
    Description / Table of Contents: Part I: DevOps: Conflict to Collaboration --- Chapter 1: DevOps in the Ascendency --- Chapter 2: IT Impasse --- Chapter 3: DevOps Foundations --- Part II: Essential DevOps Tooling --- Chapter 4: Build: DevOps Driven APIs --- Chapter 5: Test: Championing Quality - Continuously --- Chapter 6: Deploy --- Chapter 7: Manage: Agile Operations --- Part III: Tuning and Continuous Improvement --- Chapter 8: Practical DevOps --- Chapter 9: DevOps and Real World ROI --- Chapter 10: Ready, Set, DevOps!
    Pages: Online-Ressource (XV, 173 pages) , 24 illustrations in color
    ISBN: 9781484218426
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Unknown
    Cham : Springer
    Keywords: Computer science ; Computer organization ; Computers ; Artificial intelligence ; Computer simulation ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Simulation and Modeling
    Description / Table of Contents: Preface --- Part I: The Concept of Anti-Fragility: 1 Introduction --- 2 Achieving Anti-Fragility --- 3 The Need to Build Trust --- 4 Principles Ensuring Anti-Fragility --- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions --- 6 An Anti-Fragile e-Government System --- 7 Anti-Fragile Cloud-Based Telecom Systems --- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading --- 9 Robustness to Malware Reinfections --- 10 Anti-Fragility to Malware Spreading --- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm --- 12 Detecting Anomalies with the CLA --- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work --- About the Author --- References --- Index
    Pages: Online-Ressource (XVIII, 151 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9783319300702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: 1 Introduction --- Part I Business Operation Support --- 2 Subject-Oriented Business Processes Meet Strategic Management: Two Case Studies from the Manufacturing Industry --- 3 Communication- and Value-Based Organizational Development at the University Clinic for Radiotherapy-Radiation Oncology --- 4 Introducing S-BPM at an IT Service Providers --- 5 A Service Hardware Application Case Fiducia --- 6 Designing an Agile Process Layer for Competitive Differentiation --- Part II Consultancy and Education Support --- 7 Model as You Do: Engaging an S-BPM Vendor on Process Modelling in 3D Virtual Worlds --- 8 A Tangible Modeling Interface for Subject-Oriented Business Process Management --- 9 A Reference Model for Maintenance Processes --- 10 Role and Rights Management --- 11 Embodying Business Rules in S-BPM --- 12 Agents Implementing Subject Behaviour: A Manufacturing Scenario --- Part III Technical Execution Support --- 13 An Abstract State Machine Interpreter for S-BPM --- 14 Structured Communication—Approaching S-BPM with Microsoft Technologies --- 15 ERP Integration in S-BPM Processes
    Pages: Online-Ressource (XIV, 283 pages) , 134 illustrations
    ISBN: 9783319175423
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Keywords: Business ; Management information systems ; Software engineering ; Computer science ; Business and Management ; Business Information Systems ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Full Research Papers --- Experience Reports --- Empirical Studies Papers --- Doctoral Symposium Papers
    Pages: Online-Ressource (XIII, 334 pages) , 37 illustrations
    ISBN: 9783319335155
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Keywords: Computer science ; Computer hardware ; Computer organization ; Software engineering ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computer Systems Organization and Communication Networks ; Computing Methodologies ; Computing Milieux ; Computer Hardware
    Description / Table of Contents: Concurrent and Distributed Systems --- Computing the concurrency threshold of sound free-choice workflow nets --- Fine-Grained Complexity of Safety Verification --- Parameterized verification of synchronization in constrained reconfigurable broadcast networks --- EMME: a formal tool for the ECMAScript Memory Model Evaluation --- SAT and SMT II --- What a Difference a Variable Makes --- Abstraction Refinement for Emptiness Checking of Alternating Data Automata --- Revisiting Enumerative Instantiation --- An Non-linear Arithmetic Procedure for Control-Command Software Verification --- Security and Reactive Systems --- Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection --- Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts --- RVHyper: A Runtime Verification Tool for Temporal Hyperproperties --- The Refinement Calculus of Reactive Systems Toolset --- Static and Dynamic Program Analysis --- TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation --- Optimal Dynamic Partial Order Reduction with Observers --- Structurally Defined Conditional Data-flow Static Analysis --- Geometric Nontermination Arguments --- Hybrid and Stochastic Systems --- Efficient dynamic error reduction for hybrid systems reachability analysis --- AMT2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic --- Multi-Cost Bounded Reachability in MDPs --- A Statistical Model Checker for Nondeterminism and Rare Events --- Temporal logic and mu-calculus --- Permutation Games for the Weakly Aconjunctive mu-Calculus --- Symmetry Reduction for the Local Mu-Calculus --- Bayesian Statistical Parameter Synthesis for Linear Temporal Properties of Stochastic Models --- 7th Competition on Software Verification (SV-COMP) --- 2LS: Memory Safety and Non-Termination (Competition contribution) --- Yogar-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement (Competition Contribution) --- CPA-BAM-Slicing: Block-Abstraction Memorization and Slicing with Region-Based Dependency Analysis (Competition Contribution) --- InterpChecker: Reducing State Space via Interpolations (Competition Contribution) --- Map2Check using LLVM and KLEE (Competition Contribution) --- Symbiotic 5: Boosted Instrumentation (Competition Contribution) --- Ultimate Automizer and the Search for Perfect Interpolants (Competition Contribution) --- Ultimate Taipan with Dynamic Block Encoding (Competition Contribution) --- VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)
    Pages: Online-Ressource (XX, 465 pages) , 92 illustrations
    ISBN: 9783319899633
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XIX, 703 pages) , 146 illustrations
    ISBN: 9783319961453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Humanities ; Digital libraries ; Computers ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Information Systems and Communication Service ; Digital Humanities ; Technology and Digital Education
    Description / Table of Contents: Seit Jahren wird unser Alltag geprägt von zunehmender Automation und Vernetzung, die Digitalisierung genannt wird. Sensoren erfassen immer mehr unterschiedliche Daten und werden von intelligenten Algorithmen zunehmend präzisier analysiert. Dies führt nicht nur zu einem anderen Verhältnis im Umgang und bei der Nutzung von Daten durch Menschen und Maschinen, sondern wird auch dramatisch Aufgaben und Prozesse verändern. Die damit verbundenen Arbeitsanforderungen werden zum massiven Wandel von Berufsbildern führen, in dem einfache Tätigkeiten automatisiert und komplexe Tätigkeiten vereinfacht werden. Nicht nur das Arbeiten sondern auch das Lernen, Lehren und Forschen verändert sich durch die Digitalisierung. Die technischen Möglichkeiten wandeln die Lebenswelten mit ihren urbanen Versorgungs- und Infrastrukturen und eröffnen den Wirtschaftsräumen neue Geschäftsmodelle. Diese parallel einsetzenden Entwicklungen führen zu radikalen Umbrüchen, die in den kommenden Jahren sämtliche Aspekte der Gesellschaft verändern werden
    Pages: Online-Ressource (IX, 199 Seiten)
    ISBN: 9783662528549
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Keywords: Computer science ; Management ; Industrial management ; Information technology ; Business ; Data processing ; Computers ; Computer Science ; Information Systems and Communication Service ; Innovation/Technology Management ; IT in Business
    Description / Table of Contents: Modelle --- Modellierungssprachen --- Vorgehensweise von der Modellbildung zur Digitalisierung --- Vorbereitung der Prozessimplementierung --- Umsetzung --- Praxisbeispiel
    Pages: Online-Ressource (X, 254 Seiten) , 143 Abbildungen, 69 Abbildungen in Farbe
    ISBN: 9783658226480
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Humanities ; Digital libraries ; Computers ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Information Systems and Communication Service ; Digital Humanities ; Technology and Digital Education
    Description / Table of Contents: Seit Jahren wird unser Alltag geprägt von zunehmender Automation und Vernetzung, die Digitalisierung genannt wird. Sensoren erfassen immer mehr unterschiedliche Daten und werden von intelligenten Algorithmen zunehmend präzisier analysiert. Dies führt nicht nur zu einem anderen Verhältnis im Umgang und bei der Nutzung von Daten durch Menschen und Maschinen, sondern wird auch dramatisch Aufgaben und Prozesse verändern. Die damit verbundenen Arbeitsanforderungen werden zum massiven Wandel von Berufsbildern führen, in dem einfache Tätigkeiten automatisiert und komplexe Tätigkeiten vereinfacht werden. Nicht nur das Arbeiten sondern auch das Lernen, Lehren und Forschen verändert sich durch die Digitalisierung. Die technischen Möglichkeiten wandeln die Lebenswelten mit ihren urbanen Versorgungs- und Infrastrukturen und eröffnen den Wirtschaftsräumen neue Geschäftsmodelle. Diese parallel einsetzenden Entwicklungen führen zu radikalen Umbrüchen, die in den kommenden Jahren sämtliche Aspekte der Gesellschaft verändern werden
    Pages: Online-Ressource (IX, 199 Seiten)
    ISBN: 9783662528549
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Keywords: Computer science ; Computer communication systems ; Software engineering ; Mathematical statistics ; Computers ; Artificial intelligence ; Computer graphics ; Computer Science ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Computer Communication Networks ; Software Engineering/Programming and Operating Systems ; Probability and Statistics in Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Smart algorithms --- Data classification and processing --- Stochastic modelling --- Performance evaluation --- Queuing systems --- Wireless networks and security --- Image processing and computer vision
    Pages: Online-Ressource (XIII, 278 pages) , 75 illustrations
    ISBN: 9783319472171
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Keywords: Computer science ; Computers ; Education ; Computer Science ; Information Systems and Communication Service ; Education, general
    Description / Table of Contents: Innovative Technologies for an Engaging Classroom (iTEC) --- Development of the Future Classroom Toolkit --- Designing Edukata, a Participatory Design Model for Creating Learning Activities --- The iTEC Technical Artefacts, Architecture and Educational Cloud --- The Composer: Creating, Sharing and Facilitating Learning Designs --- Recommender Systems --- Resources beyond Content for Open Education --- The iTEC Widget Store --- The Impact and Potential of iTEC: Evidence from large-scale Validation in School Classrooms
    Pages: Online-Ressource (XVII, 201 pages) , 47 illustrations, 42 illustrations in color
    ISBN: 9783319193663
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Common challenges with software --- The map --- A holistic view to change --- The compass --- The journeys --- Co-develop in a community --- Charing is caring --- A thriving Open Source culture behind the wall --- Keeping the doors open.- Building ecosystems --- Pushing the boundaries --- Add supplementary services --- Adding Internet to things --- Boosting product sales by services --- Deliver 24/7 --- Pruning a bush --- Ensuring prima deliveries --- Pump up the volume --- Global R&D goes agile with SAFe --- Multi-site development --- Agile and disciplined --- Scaling Agile in Automotive --- Scaling Agile in Life sciences --- Outside the box --- Efficient communication --- Outsourcing Strategy at Sony Mobile --- Not so shore anymore --- Play it again, Sam, backwards --- First things first --- Robotic growing pains --- Softhouse reflects on architecture changes --- From mobile to Platform --- Your journey
    Pages: Online-Ressource (XXIII, 242 pages)
    ISBN: 9783319531168
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Keywords: Computer science ; Logic design ; Computer organization ; Operating systems (Computers) ; Computers ; Computer Science ; Computing Methodologies ; Computer Systems Organization and Communication Networks ; Operating Systems ; Logic Design ; Information Systems and Communication Service
    Description / Table of Contents: HHVSF: A Framework to Accelerate Drug-based High-throughput Virtual Screening on High-Performance Computers --- HBasechainDB --- A Scalable Blockchain Framework on Hadoop Ecosystem --- DETOUR: A Large-Scale Non-Blocking Optical Data Center Fabric --- Querying Large Scientific Data Sets with Adaptable IO System ADIOS --- On the Performance of Spark on HPC Systems: Towards a Complete Picture --- Experiences of Converging Big Data Analytics Frameworks with High Performance Computing Systems --- MACC : An OpenACC Transpiler for Automatic Multi-GPU Use --- Acceleration of Wind Simulation using Locally Mesh-Refined Lattice Boltzmann Method on GPU-Rich supercomputers --- Architecture of an FPGA-Based Heterogeneous System for Code-Search Problems --- TINS: A Task-Based Dynamic Helper Core Strategy for In Situ Analytics --- Machine Learning Predictions for Underestimation of Job Runtime on HPC System --- A Power Management Framework with Simple DSL for Automatic Power-Performance Optimization on Power-Constrained HPC Systems --- Scalable Data Management of the Uintah Simulation Framework for Next-Generation Engineering Problems with Radiation --- High performance LOBPCG method for solving multiple eigenvalues of Hubbard model: Efficiency of communication avoiding Neumann expansion preconditioner --- Application of a preconditioned Chebyshev basis communication-avoiding conjugate gradient method to a multiphase thermal-hydraulic CFD code --- Optimization of Hierarchical matrix computation on GPU
    Pages: Online-Ressource (X, 293 pages) , 121 illustrations
    ISBN: 9783319699530
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Keywords: Computer science ; Computer system failures ; Software engineering ; Data structures (Computer science) ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Theorem Proving --- Unification with Abstraction and Theory Instantiation in Saturation-based Reasoning --- Efficient verification of imperative programs using auto2 --- Frame Inference for Inductive Entailment Proofs in Separation Logic --- Verified Model Checking of Timed Automata --- SAT and SMT I --- Chain Reduction for Binary and Zero-Suppressed Decision Diagrams --- CDCLSym: Introducing E_ective Symmetry Breaking in SAT Solving --- Automatic Generation of Precise and Useful Commutativity Conditions --- Bit-Vector Model Counting using Statistical Estimation --- Deductive Verification --- Hoare Logics for Time Bounds --- A Verified Implementation of the Bounded List Container --- Automating Deductive Verification for Weak-Memory Programs --- Software Verification and Optimisation --- Property Checking Array Programs Using Loop Shrinking --- Invariant Synthesis for Incomplete Verification Engines --- Accelerating Syntax-Guided Invariant Synthesis --- Daisy - Framework for Analysis and Optimization of Numerical Programs --- Model Checking --- Oink: an Implementation and Evaluation of Modern Parity Game Solvers --- More Scalable LTL Model Checking via Discovering Design-Space Dependencies (D^3) --- Generation of Minimum Tree-like Witnesses for Existential CTL --- From Natural Projection to Partial Model Checking and Back --- Machine Learning --- ICE-based Refinement Type Discovery for Higher-Order Functional Programs --- Strategy Representation by Decision Trees in Reactive Synthesis --- Feature-Guided Black-Box Safety Testing of Deep Neural Networks.
    Pages: Online-Ressource (XX, 429 pages) , 93 illustrations
    ISBN: 9783319899602
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Unknown
    Cham : Springer
    Keywords: Software engineering ; Management information systems ; Information Systems ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: 1 The Leading Role of Software and Systems Architecture in the Age of Digitization --- 2 Formal Methods and Agile Development: Towards a Happy Marriage --- 3 Escaping Method Prison – On the Road to Real Software Engineering --- 4 What is software?: The Role of Empirical Methods in Answering the Question --- 5 Only the Architecture You Need --- 6 Variability in standard software products Introducing software product line engineering to the insurance industry --- 7 Using Design Thinking for Requirements Engineering in the Context of Digitalization and Digital Transformation – a Motivation and an Experience Report --- 8 Towards Deviceless Edge Computing: Challenges, Design Aspects & Models for Serverless paradigm at the Edge --- 9 Data-driven decisions and actions in today’s software development --- 10 Software Architecture: Past, Present, Future --- 11 Software Product Lines --- 12 Enabling Flexible and Robust Business Process Automation for the Agile Enterprise --- 13 Achievements, Failures, and the Future of Model-based Software Engineering
    Pages: Online-Ressource (XV, 236 pages) , 98 illustrations, 51 illustrations in color
    ISBN: 9783319738970
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Agile requirements --- COSMIC User Story Standard --- Improving Mockup-based Requirement Specification with End-User Annotations --- Agile testing --- Combining STPA and BDD for Safety Analysis and Verification in Agile Development: A Controlled Experiment --- Software tester, we want to hire you! An analysis of the demand for soft skills --- Developers' initial perceptions on TDD practice: A thematic analysis with distinct domains and languages --- Myths and Facts about Static Application Security Testing Tools: An Action Research at Telenor Digital --- Automated Acceptance Tests as Software Requirements: An Experiment to Compare the Applicability of Fit tables and Gherkin Language --- Agile transformation --- Interface Problems of Agile in a Non-Agile Environment --- Enterprise agility: Why is transformation so hard? --- Technical and Organizational Agile Practices: A Latin-American Survey --- Agile Software Development { Adoption & Maturity: An Activity Theory Perspective --- Scaling agile --- Do Agile Methods Work for Large Software Projects? --- Learning in the Large - An Exploratory Study of Retrospectives in Large-Scale Agile Development --- Reporting in Agile Portfolio Management: Routines, Metrics and Artefacts to Maintain an Effective Oversight --- Inter-team Coordination in Large-Scale Agile Development: A Case Study of Three Enabling Mechanisms --- Supporting Large-Scale Agile Development with Domain-driven Design --- Towards Agile Scalability Engineering --- Human-centric agile --- Stress in Agile Software Development: Practices and Outcomes --- Teamwork quality and team performance: Exploring differences between small and large agile projects --- Continuous experimentation --- Challenges and Strategies for Undertaking Continuous Experimentation to Embedded Systems: Industry and Research Perspectives --- ICOs overview: should investors choose an ICO developed with the Lean Startup methodology?
    Pages: Online-Ressource (XV, 309 pages) , 50 illustrations
    ISBN: 9783319916026
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Keywords: Computer science ; Software engineering ; Computers ; Law and legislation ; Management information systems ; Computer Science ; Management of Computing and Information Systems ; Software Engineering ; Legal Aspects of Computing ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: This book is open access under a CC BY license. This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017. The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, and practices; case studies; projects, communication, and participation; tools; and project management, development and evaluation
    Pages: Online-Ressource (XIV, 220 pages) , 37 illustrations
    ISBN: 9783319577357
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: Introduction --- Industrial Challenges. S-BPM's Industrial Capabilities --- Lot-Size One Production. People-Centred Production Design --- Human-Controlled Production --- Learnings --- The Future: Obstacles and Opportunities
    Pages: Online-Ressource (XIV, 232 pages) , 78 illustrations
    ISBN: 9783319484662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Keywords: Computer science ; Computer organization ; Software engineering ; Application software ; System theory ; Computer Science ; Computer Systems Organization and Communication Networks ; Software Engineering ; Complex Systems ; Information Systems Applications (incl. Internet) ; Computer Applications
    Description / Table of Contents: Basic concepts on systems of systems --- interfaces in evolving cyber-physical systems-of-systems --- emergence in cyber-physical systems-of-systems (CPSOSS) --- AMADEOS sysml profile for SoS conceptual modeling --- AMADEOS framework and supporting tools --- time and resilient master clocks in cyber-physical systems --- managing dynamicity in SoS --- case study definition and implementation
    Pages: Online-Ressource (XV, 257 pages) , 124 illustrations
    ISBN: 9783319475905
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Improving Agile Processes --- Reflection in Agile Retrospectives --- What influences the speed of prototyping? An empirical investigation of twenty software startups --- Key Challenges in Agile Requirements Engineering --- A Multiple Case Study on Selecting a Technique for User-Interaction Data Collecting --- Comparing Requirements Decomposition within the Scrum, Scrum with Kanban, XP, and Banana Development Processes --- Effects of Technical Debt Awareness: A classroom study --- Agile in Organizations --- Don’t Forget to Breathe: A Controlled Trial of Mindfulness Practices in Agile Project Teams --- Enhancing Agile Team Collaboration through the use of Large Digital Multi-touch Cardwalls --- Knowledge Sharing in a Large Agile Organisation: A Survey Study --- Teaching Agile Methods to Software Engineering Professionals: 10 Years, 1000 Release Plans --- Are Software Startups Applying Agile? the State of the Practice from a Large Survey --- Adopting Test Automation on Agile Development Projects: A Grounded Theory Study of Indian Software Organizations --- Safety Critical Software --- How is security testing done in agile teams? A cross-case analysis of four software teams --- An assessment of avionics software development practice: justifications for an agile development process --- Short Research Papers --- Inoculating an Agile Company with User-Centred Design: an Empirical Study --- On the Usage and Benefits of Agile Methods & Practices --- Checklists to Support Test Charter Design in Exploratory Testing --- Discovering Software Process Deviations Using Visualizations --- Exploring Workflow Mechanisms and Task Allocation Strategies in Agile Software Teams --- Are daily stand-up meetings valuable? A survey of developers in software teams --- Doctoral Symposium Papers --- Knowledge Management and Reflective Practice in Daily Stand-up and Retrospective Meetings --- Self-Assignment: Task Allocation Practice in Agile Software Development --- Software Development Practices Patterns.
    Pages: Online-Ressource (XIII, 306 pages) , 55 illustrations
    ISBN: 9783319576336
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Unknown
    Cham : Springer
    Keywords: Mathematics ; Software engineering ; Algorithms ; Computer mathematics ; Visualization ; Computer software ; Numerical analysis ; Mathematics ; Computational Science and Engineering ; Algorithms ; Visualization ; Mathematical Software ; Numerical Analysis ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: 1 Preliminaries --- 2 Fundamentals: Solving the Poisson Equation --- 3 A Gallery of Finite Element Solvers --- 4 Subdomains and Boundary Conditions --- 5 Extensions: Improving the Poisson Solver --- References
    Pages: Online-Ressource (XI, 146 pages) , 17 illustrations, 16 illustrations in color
    ISBN: 9783319524627
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-07
    Description: Information Systems and Communication Service; Artificial Intelligence (incl. Robotics); Computer Communication Networks; Software Engineering/Programming and Operating Systems; Probability and Statistics in Computer Science; Computer Imaging, Vision, Pattern Recognition and Graphics
    Keywords: Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Computer Communication Networks ; Software Engineering/Programming and Operating Systems ; Probability and Statistics in Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics ; thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJM Management and management techniques::KJMV Management of specific areas ; thema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNB Energy industries and utilities ; thema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KND Manufacturing industries ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TC Biochemical engineering ; thema EDItEUR::W Lifestyle, Hobbies and Leisure::WC Antiques, vintage and collectables::WCF Collecting coins, banknotes, medals and other related items
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2021-02-10
    Description: This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
    Keywords: Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence ; Simulation and Modeling ; Computer Engineering and Networks ; Database Management System ; Computer Science ; Anomaly detection ; Anti-fragility ; Cloud computing ; Complex adaptive systems ; DevOps (Development and Operation) ; Diversity ; Loose coupling ; Malware ; Malware detection ; Microservices ; Modules ; Monitoring ; Redundancy ; Risk analysis ; Software architecture ; Software design ; System dependencies ; Tight coupling ; Trust ; Weak links ; Computer networking & communications ; Computer modelling & simulation ; bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYM Computer modelling & simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems.
    Keywords: Computer science ; Computer security ; Software engineering ; Artificial intelligence ; Computer system failures ; Computers ; Computers ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UR Computer security ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2023-03-03
    Description: Database Management; Artificial Intelligence (incl. Robotics); Information Systems and Communication Service
    Keywords: Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service ; bic Book Industry Communication::K Economics, finance, business & management::KN Industry & industrial studies::KNB Energy industries & utilities ; bic Book Industry Communication::K Economics, finance, business & management::KN Industry & industrial studies::KND Manufacturing industries::KNDP Pharmaceutical industries ; bic Book Industry Communication::K Economics, finance, business & management::KN Industry & industrial studies::KNT Media, information & communication industries::KNTX Information technology industries ; bic Book Industry Communication::T Technology, engineering, agriculture::TC Biochemical engineering ; bic Book Industry Communication::U Computing & information technology::UY Computer science ; bic Book Industry Communication::W Lifestyle, sport & leisure::WC Antiques & collectables::WCF Coins, banknotes, medals, seals (numismatics)
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2021-02-10
    Description: This open access book constitutes the proceedings of the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019. XP is the premier agile software development conference combining research and practice. It is a hybrid forum where agile researchers, academics, practitioners, thought leaders, coaches, and trainers get together to present and discuss their most recent innovations, research results, experiences, concerns, challenges, and trends. Following this history, for both researchers and seasoned practitioners XP 2019 provided an informal environment to network, share, and discover trends in Agile for the next 20 years The 15 full papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: agile adoption, agile practices; large-scale agile; agility beyond IT, and the future of agile. ;
    Keywords: Computer science ; Software engineering ; Management information systems ; Management information systems ; Computer science ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJQ Business mathematics & systems ; bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZM Information architecture
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verification to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications.
    Keywords: Computer science ; Computer logic ; Software engineering ; Artificial intelligence ; Mathematical logic ; Algorithms ; Computer simulation ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This open access two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2021, which was held during March 27 – April 1, 2021, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2021. The conference was planned to take place in Luxembourg and changed to an online format due to the COVID-19 pandemic. The total of 41 full papers presented in the proceedings was carefully reviewed and selected from 141 submissions. The volume also contains 7 tool papers; 6 Tool Demo papers, 9 SV-Comp Competition Papers. The papers are organized in topical sections as follows: Part I: Game Theory; SMT Verification; Probabilities; Timed Systems; Neural Networks; Analysis of Network Communication. Part II: Verification Techniques (not SMT); Case Studies; Proof Generation/Validation; Tool Papers; Tool Demo Papers; SV-Comp Tool Competition Papers.
    Keywords: Theory of Computation ; Computer Systems Organization and Communication Networks ; Control Structures and Microprogramming ; Logic in AI ; Information Systems and Communication Service ; Computer Engineering and Networks ; architecture verification and validation ; artificial intelligence ; automata theory ; computer networks ; embedded systems ; formal languages ; formal logic ; linguistics ; mathematics ; model checking ; model-checking ; SAT and SMT solving ; signal processing ; software and hardware verification ; software architecture ; software engineering ; specification and verification techniques ; static and dynamic program analysis ; system construction and transforamtion techniques ; theorem-proving ; Computer science ; Mathematical theory of computation ; Computer networking & communications ; Algorithms & data structures ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/png
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This open access book constitutes the refereed proceedings of the 6th Asian Supercomputing Conference, SCFA 2020, which was planned to be held in February 2020, but unfortunately, the physical conference was cancelled due to the COVID-19 pandemic. The 8 full papers presented in this book were carefully reviewed and selected from 22 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.
    Keywords: Computer Systems Organization and Communication Networks ; Image Processing and Computer Vision ; Control Structures and Microprogramming ; Input/Output and Data Communications ; Operating Systems ; Information Systems and Communication Service ; Computer Engineering and Networks ; Computer Vision ; Database Management System ; computer hardware ; computer networks ; computer systems ; distributed computer systems ; distributed systems ; embedded systems ; hpc ; image processing ; microprocessor chips ; network protocols ; parallel architectures ; parallel processing systems ; processors ; signal processing ; telecommunication networks ; telecommunication systems ; telecommunication traffic ; open access ; Computer networking & communications ; Image processing ; Computer vision ; Algorithms & data structures ; Distributed databases ; Operating systems ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYT Image processing ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UL Operating systems
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2021-02-10
    Description: This open access book constitutes the research workshops, doctoral symposium and panel summaries presented at the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019. XP is the premier agile software development conference combining research and practice. It is a hybrid forum where agile researchers, academics, practitioners, thought leaders, coaches, and trainers get together to present and discuss their most recent innovations, research results, experiences, concerns, challenges, and trends. Following this history, for both researchers and seasoned practitioners XP 2019 provided an informal environment to network, share, and discover trends in Agile for the next 20 years. Research papers and talks submissions were invited for the three XP 2019 research workshops, namely, agile transformation, autonomous teams, and large scale agile. This book includes 15 related papers. In addition, a summary for each of the four panels at XP 2019 is included. The panels were on security and privacy; the impact of the agile manifesto on culture, education, and software practices; business agility – agile’s next frontier; and Agile – the next 20 years.
    Keywords: Computer science ; Software engineering ; Management information systems ; Computer science ; Management information systems ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJQ Business mathematics & systems ; bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZM Information architecture
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 28th European Symposium on Programming, ESOP 2019, which took place in Prague, Czech Republic, in April 2019, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019.
    Keywords: Computer science ; Programming languages (Electronic computers) ; Computer programming ; Software engineering ; Computers ; Computers ; Computer system failures ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMX Programming and scripting languages: general ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verification to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications.
    Keywords: Computer science ; Computer logic ; Software engineering ; Artificial intelligence ; Mathematical logic ; Algorithms ; Computer simulation ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-14
    Description: This open access book constitutes the refereed proceedings of the 16th International Conference on Semantic Systems, SEMANTiCS 2020, held in Amsterdam, The Netherlands, in September 2020. The conference was held virtually due to the COVID-19 pandemic.
    Keywords: Knowledge based Systems ; Computer Applications ; Information Systems and Communication Service ; Computer and Information Systems Applications ; Computer Engineering and Networks ; artificial intelligence ; computer science ; computer systems ; data handling ; databases ; dbpedia ; internet ; knowledge-based system ; linguistics ; linked data ; Natural Language Processing (NLP) ; natural languages ; ontologies ; query languages ; query processing ; resource description framework ; search engines ; semantic web ; semantics ; World Wide Web ; Expert systems / knowledge-based systems ; Information technology: general issues ; Computer networking & communications ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This book is Open Access under a CC BY licence. The LNCS 11427 and 11428 proceedings set constitutes the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019. The total of 42 full and 8 short tool demo papers presented in these volumes was carefully reviewed and selected from 164 submissions. The papers are organized in topical sections as follows: Part I: SAT and SMT, SAT solving and theorem proving; verification and analysis; model checking; tool demo; and machine learning. Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; synthesis; symbolic verification; and safety and fault-tolerant systems.
    Keywords: Computer science ; Computer logic ; Mathematical logic ; Software engineering ; Artificial intelligence ; Computer system failures ; Computers ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-03-29
    Description: Information Systems and Communication Service; Education, general
    Keywords: Information Systems and Communication Service ; Education, general ; bic Book Industry Communication::J Society & social sciences::JN Education ; bic Book Industry Communication::K Economics, finance, business & management::KN Industry & industrial studies::KNT Media, information & communication industries::KNTX Information technology industries ; bic Book Industry Communication::U Computing & information technology::UY Computer science ; thema EDItEUR::J Society and Social Sciences::JN Education ; thema EDItEUR::K Economics, Finance, Business and Management::KN Industry and industrial studies::KNT Media, entertainment, information and communication industries::KNTX Information technology industries ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-03-23
    Description: This open access book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing experts in order to highlight the state of the art as well as future challenges and trends. In addition, it covers current and emerging technologies like test automation, DevOps, and artificial intelligence methodologies used for software testing, before taking a look into the future. The contributing authors answer questions like: "How is the profession of tester currently changing? What should testers be prepared for in the years to come, and what skills will the next generation need? What opportunities are available for further training today? What will testing look like in an agile world that is user-centered and fast-paced? What tasks will remain for testers once the most important processes are automated?" iSQI has been focused on the education and certification of software testers for fifteen years now, and in the process has contributed to improving the quality of software in many areas. The papers gathered here clearly reflect the numerous ways in which software quality assurance can play a critical role in various areas. Accordingly, the book will be of interest to both professional software testers and managers working in software testing or software quality assurance.
    Keywords: Computer science ; Software engineering ; Management information systems ; Management information systems ; Computer science ; thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYZ Human–computer interaction::UYZM Information architecture
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 23rd International Conference on Fundamental Approaches to Software Engineering, FASE 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The 23 full papers, 1 tool paper and 6 testing competition papers presented in this volume were carefully reviewed and selected from 81 submissions. The papers cover topics such as requirements engineering, software architectures, specification, software quality, validation, verification of functional and non-functional properties, model-driven development and model transformation, software processes, security and software evolution.
    Keywords: Software Engineering ; Special Purpose and Application-Based Systems ; Control Structures and Microprogramming ; Computer System Implementation ; Information Systems and Communication Service ; Artificial Intelligence ; open access ; software engineering ; requirements engineering ; model-based design ; software analysis ; testing ; software architectures ; security ; model transformations ; software evolution ; software product lines ; architecting ; artificial intelligence ; computer programming ; computer systems ; embedded systems ; mathematics ; software architecture ; software design ; Expert systems / knowledge-based systems ; Algorithms & data structures ; Systems analysis & design ; Computer networking & communications ; Artificial intelligence ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This book is Open Access under a CC BY licence. This book constitutes the proceedings of the 22nd International Conference on Fundamental Approaches to Software Engineering, FASE 2019, which took place in Prague, Czech Republic in April 2019, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019. The 24 papers presented in this volume were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections named: software verification; model-driven development and model transformation; software evolution and requirements engineering; specification, design, and implementation of particular classes of systems; and software testing.
    Keywords: Computer science ; Software engineering ; Programming languages (Electronic computers) ; Computer system failures ; Computers ; Computers ; Computer simulation ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMX Programming and scripting languages: general ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMX Programming and scripting languages: general ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency.
    Keywords: Computer science ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Artificial intelligence ; Computer simulation ; Computer organization ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMX Programming and scripting languages: general ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which was planned to take place in Dublin, Ireland, in April 2020, as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The actual ETAPS 2020 meeting was postponed due to the Corona pandemic. The papers deal with fundamental issues in the specification, design, analysis, and implementation of programming languages and systems.
    Keywords: Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; Control Structures and Microprogramming ; Information Systems and Communication Service ; Natural Language Processing (NLP) ; Theory of Computation ; artificial intelligence ; computer networks ; computer programming ; computer security ; distributed computer systems ; embedded systems ; formal languages ; formal logic ; linguistics ; mathematics ; model checking ; object-oriented programming ; parallel processing systems ; program compilers ; semantics ; software architecture ; software design ; software engineering ; software quality ; verification and validation ; Programming & scripting languages: general ; Compilers & interpreters ; Computer networking & communications ; Algorithms & data structures ; Natural language & machine translation ; Computer science ; Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMX Programming and scripting languages: general ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQL Natural language and machine translation ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This book is Open Access under a CC BY licence. The LNCS 11427 and 11428 proceedings set constitutes the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019. The total of 42 full and 8 short tool demo papers presented in these volumes was carefully reviewed and selected from 164 submissions. The papers are organized in topical sections as follows: Part I: SAT and SMT, SAT solving and theorem proving; verification and analysis; model checking; tool demo; and machine learning. Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; synthesis; symbolic verification; and safety and fault-tolerant systems.
    Keywords: Computer science ; Computer logic ; Software engineering ; Mathematical logic ; Algorithms ; Logic design ; Artificial intelligence ; Computer logic ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYF Computer architecture and logic design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic.
    Keywords: Software Engineering ; Theory of Computation ; Computer Systems Organization and Communication Networks ; Artificial Intelligence ; Information Systems and Communication Service ; Computer Hardware ; Computer Engineering and Networks ; Database Management System ; architecture verification and validation ; artificial intelligence ; computer hardware ; computer networks ; computer programming ; computer systems ; data security ; distributed computer systems ; embedded systems ; formal logic ; linguistics ; model checking ; network protocols ; parallel processing systems ; signal processing ; software architecture ; software design ; software quality ; verification and validation ; Open Access ; Computer science ; Mathematical theory of computation ; Computer networking & communications ; Artificial intelligence ; Computer hardware ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ; thema EDItEUR::U Computing and Information Technology::UK Computer hardware
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: This book is Open Access under a CC BY licence. This book, LNCS 11429, is part III of the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019. It's a special volume on the occasion of the 25 year anniversary of TACAS.
    Keywords: Computer science ; Computer logic ; Software engineering ; Mathematical logic ; Computers ; Computer system failures ; Computer simulation ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This open access book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together more than 20 environmental and Earth science research infrastructures into a single community. It provides readers with a systematic overview of the common challenges faced by research infrastructures and how a ‘reference model guided’ engineering approach can be used to achieve greater interoperability among such infrastructures in the environmental and earth sciences. The 20 contributions in this book are structured in 5 parts on the design, development, deployment, operation and use of research infrastructures. Part one provides an overview of the state of the art of research infrastructure and relevant e-Infrastructure technologies, part two discusses the reference model guided engineering approach, the third part presents the software and tools developed for common data management challenges, the fourth part demonstrates the software via several use cases, and the last part discusses the sustainability and future directions.
    Keywords: Computer Applications ; Environment, general ; Special Purpose and Application-Based Systems ; Information Systems and Communication Service ; Software Engineering/Programming and Operating Systems ; Geography, general ; Computer and Information Systems Applications ; Environmental Sciences ; Database Management System ; Software Engineering ; Geography ; cloud computing ; cloud providers ; cloud services ; computer networks ; computing resource ; data communication systems ; databases ; distributed computer systems ; distributed systems ; engineering ; grid computing ; internet ; network protocols ; open access ; parallel processing systems ; signal processing ; telecommunication networks ; wireless telecommunication systems ; Information technology: general issues ; The environment ; Expert systems / knowledge-based systems ; Computer networking & communications ; Operating systems ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RN The environment ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RG Geography
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-14
    Description: The open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency.
    Keywords: Computer science ; Software engineering ; Computer logic ; Mathematical logic ; Computer system failures ; Computers ; Artificial intelligence ; Computer logic ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    facet.materialart.
    Unknown
    Springer Nature
    Publication Date: 2024-04-07
    Description: This open access book presents the outcomes of the “Design for Future – Managed Software Evolution” priority program 1593, which was launched by the German Research Foundation (“Deutsche Forschungsgemeinschaft (DFG)”) to develop new approaches to software engineering with a specific focus on long-lived software systems. The different lifecycles of software and hardware platforms lead to interoperability problems in such systems. Instead of separating the development, adaptation and evolution of software and its platforms, as well as aspects like operation, monitoring and maintenance, they should all be integrated into one overarching process. Accordingly, the book is split into three major parts, the first of which includes an introduction to the nature of software evolution, followed by an overview of the specific challenges and a general introduction to the case studies used in the project. The second part of the book consists of the main chapters on knowledge carrying software, and cover tacit knowledge in software evolution, continuous design decision support, model-based round-trip engineering for software product lines, performance analysis strategies, maintaining security in software evolution, learning from evolution for evolution, and formal verification of evolutionary changes. In turn, the last part of the book presents key findings and spin-offs. The individual chapters there describe various case studies, along with their benefits, deliverables and the respective lessons learned. An overview of future research topics rounds out the coverage. The book was mainly written for scientific researchers and advanced professionals with an academic background. They will benefit from its comprehensive treatment of various topics related to problems that are now gaining in importance, given the higher costs for maintenance and evolution in comparison to the initial development, and the fact that today, most software is not developed from scratch, but as part of a continuum of former and future releases.
    Keywords: Computer science ; Software engineering ; Management information systems ; Management information systems ; Computer science ; Computers ; thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYZ Human–computer interaction::UYZM Information architecture
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...