ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Software engineering ; Computers ; Law and legislation ; Management information systems ; Computer Science ; Management of Computing and Information Systems ; Software Engineering ; Legal Aspects of Computing ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: This book is open access under a CC BY license. This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017. The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, and practices; case studies; projects, communication, and participation; tools; and project management, development and evaluation
    Pages: Online-Ressource (XIV, 220 pages) , 37 illustrations
    ISBN: 9783319577357
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Computers ; Computers and civilization ; Computer Science ; History of Computing ; User Interfaces and Human Computer Interaction ; Computer Appl. in Arts and Humanities ; Computers and Society
    Description / Table of Contents: Once Neglected, Now Emerging and Absolutely Necessary: On the History of Digital Humanities or An Introduction --- Why Oral History? ---  ‘Individuation is There in all the Different Strata:’ an Oral History Conversation between John Burrows, Hugh Craig and Willard McCarty --- ‘It was a Time When the University was Still Taking Account of the Meaning of universitas scientiarum’: an Oral History Conversation between Wilhelm Ott and Julianne Nyhan --- ‘hic Rhodus, hic salta’: An Oral History Interview Between Tito Orlandi and Julianne Nyhan --- ‘They Took a Chance’: An Oral History Conversation between Susan Hockey and Julianne Nyhan ---  ‘And Here We go Back Again to the Influence of Algorithmic Thinking’: An Oral History conversation between Judy Malloy and Julianne Nyhan --- ‘I Would Think of Myself as Sitting Inside the Computer, Moving Things Around in Order to Accomplish the Goal of my Programming’: An Oral History Conversation Between Mary Dee Harris and Julianne Nyhan --- ‘I Was Absolutely Convinced That There Had to be a Better Way’: An Oral History Conversation Between John Nitti and Julianne Nyhan --- ‘It’s a Little Mind-Boggling Actually’: An Oral History Conversation between Helen Agüera and Julianne Nyhan ---  ‘I Heard About the Arrival of the Computer’: An Oral History Conversation Between Hans Rutimann and Julianne Nyhan ---  ‘Langezeit habe ich der Universitaet nachgetrauert’: An Oral History Conversation between Michael Sperberg-McQueen and Julianne Nyhan.-‘It’s Probably the Only Modestly Widely used System with a Command Language in Latin’: An Oral History Conversation Between Manfred Thaller and Julianne Nyhan ---  ‘I was Keen on Getting Computers into Humanists’ Thinking’: An Oral History Conversation Between John Bradley and Julianne Nyhan ---  ‘Moderate Expectations, Tolerable Disappointments’: An Oral History Conversation between Claus Huitfeldt and Julianne Nyhan --- ‘So, Into the Chopper it Went’: An Oral History Conversation between Gabriel Egan and Julianne Nyhan --- Revolutionaries and Underdogs --- By Way of a Conclusion
    Pages: Online-Ressource (XI, 285 pages)
    ISBN: 9783319201702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Research ; Moral and ethical aspects ; Computers ; Computers and civilization ; Computer Science ; Computers and Society ; History of Computing ; Diversity Management/Women in Business ; Research Ethics
    Description / Table of Contents: Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science --- On the Big Impact of “Big Computer Science” --- On Informatics, Diamonds and T --- Leadership and Balance in Research --- Rational ethics --- Ethics for the digital age: where are the moral specs? --- Digital Sovereignty and IT-Security for a Prosperous Society --- Women in Computing and the contingency of informatics cultures --- Ada - poet of computing
    Pages: Online-Ressource (XI, 109 pages) , 22 illustrations in color
    ISBN: 9783319557359
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Unknown
    Cham : Springer
    Keywords: Computer science ; Computer organization ; Computers ; Artificial intelligence ; Computer simulation ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Simulation and Modeling
    Description / Table of Contents: Preface --- Part I: The Concept of Anti-Fragility: 1 Introduction --- 2 Achieving Anti-Fragility --- 3 The Need to Build Trust --- 4 Principles Ensuring Anti-Fragility --- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions --- 6 An Anti-Fragile e-Government System --- 7 Anti-Fragile Cloud-Based Telecom Systems --- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading --- 9 Robustness to Malware Reinfections --- 10 Anti-Fragility to Malware Spreading --- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm --- 12 Detecting Anomalies with the CLA --- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work --- About the Author --- References --- Index
    Pages: Online-Ressource (XVIII, 151 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9783319300702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Data structures (Computer science) ; User interfaces (Computer systems) ; Application software ; Computers ; Computer Science ; History of Computing ; Computer Appl. in Arts and Humanities ; Data Structures ; User Interfaces and Human Computer Interaction
    Description / Table of Contents: Part I: Artistic Contributions --- The Computer Age --- Odes to Ted Nelson --- Part II: Peer Histories --- The Two-eyed Man --- Ted Nelson’s Xanadu—Caution: Four Letter Words Ahead --- Hanging Out with Ted Nelson --- Riffing on Ted Nelson—Hypermind --- Intertwingled Inspiration --- An Advanced Book for Beginners --- Part III: Hypertext and Ted Nelson-Influenced Research --- The Importance of Ted’s Vision --- Data, Metadata and Ted --- Making Links: Everything Really is Deeply Intertwingled --- Ted Nelson --- History Debugged --- We Can and Must Understand Computers NOW --- The Future of Transclusion --- Ted Nelson: A Critical (and Critically Incomplete) Bibliography --- Part IV: The Last Word --- What Box?
    Pages: Online-Ressource (XVI, 150 pages) , 43 illustrations
    ISBN: 9783319169255
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Keywords: Computer science ; Computer communication systems ; Software engineering ; Mathematical statistics ; Computers ; Artificial intelligence ; Computer graphics ; Computer Science ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Computer Communication Networks ; Software Engineering/Programming and Operating Systems ; Probability and Statistics in Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Smart algorithms --- Data classification and processing --- Stochastic modelling --- Performance evaluation --- Queuing systems --- Wireless networks and security --- Image processing and computer vision
    Pages: Online-Ressource (XIII, 278 pages) , 75 illustrations
    ISBN: 9783319472171
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Keywords: Computer science ; Computer system failures ; Software engineering ; Data structures (Computer science) ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Theorem Proving --- Unification with Abstraction and Theory Instantiation in Saturation-based Reasoning --- Efficient verification of imperative programs using auto2 --- Frame Inference for Inductive Entailment Proofs in Separation Logic --- Verified Model Checking of Timed Automata --- SAT and SMT I --- Chain Reduction for Binary and Zero-Suppressed Decision Diagrams --- CDCLSym: Introducing E_ective Symmetry Breaking in SAT Solving --- Automatic Generation of Precise and Useful Commutativity Conditions --- Bit-Vector Model Counting using Statistical Estimation --- Deductive Verification --- Hoare Logics for Time Bounds --- A Verified Implementation of the Bounded List Container --- Automating Deductive Verification for Weak-Memory Programs --- Software Verification and Optimisation --- Property Checking Array Programs Using Loop Shrinking --- Invariant Synthesis for Incomplete Verification Engines --- Accelerating Syntax-Guided Invariant Synthesis --- Daisy - Framework for Analysis and Optimization of Numerical Programs --- Model Checking --- Oink: an Implementation and Evaluation of Modern Parity Game Solvers --- More Scalable LTL Model Checking via Discovering Design-Space Dependencies (D^3) --- Generation of Minimum Tree-like Witnesses for Existential CTL --- From Natural Projection to Partial Model Checking and Back --- Machine Learning --- ICE-based Refinement Type Discovery for Higher-Order Functional Programs --- Strategy Representation by Decision Trees in Reactive Synthesis --- Feature-Guided Black-Box Safety Testing of Deep Neural Networks.
    Pages: Online-Ressource (XX, 429 pages) , 93 illustrations
    ISBN: 9783319899602
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Computer science ; Computer hardware ; Computer organization ; Software engineering ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computer Systems Organization and Communication Networks ; Computing Methodologies ; Computing Milieux ; Computer Hardware
    Description / Table of Contents: Concurrent and Distributed Systems --- Computing the concurrency threshold of sound free-choice workflow nets --- Fine-Grained Complexity of Safety Verification --- Parameterized verification of synchronization in constrained reconfigurable broadcast networks --- EMME: a formal tool for the ECMAScript Memory Model Evaluation --- SAT and SMT II --- What a Difference a Variable Makes --- Abstraction Refinement for Emptiness Checking of Alternating Data Automata --- Revisiting Enumerative Instantiation --- An Non-linear Arithmetic Procedure for Control-Command Software Verification --- Security and Reactive Systems --- Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection --- Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts --- RVHyper: A Runtime Verification Tool for Temporal Hyperproperties --- The Refinement Calculus of Reactive Systems Toolset --- Static and Dynamic Program Analysis --- TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation --- Optimal Dynamic Partial Order Reduction with Observers --- Structurally Defined Conditional Data-flow Static Analysis --- Geometric Nontermination Arguments --- Hybrid and Stochastic Systems --- Efficient dynamic error reduction for hybrid systems reachability analysis --- AMT2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic --- Multi-Cost Bounded Reachability in MDPs --- A Statistical Model Checker for Nondeterminism and Rare Events --- Temporal logic and mu-calculus --- Permutation Games for the Weakly Aconjunctive mu-Calculus --- Symmetry Reduction for the Local Mu-Calculus --- Bayesian Statistical Parameter Synthesis for Linear Temporal Properties of Stochastic Models --- 7th Competition on Software Verification (SV-COMP) --- 2LS: Memory Safety and Non-Termination (Competition contribution) --- Yogar-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement (Competition Contribution) --- CPA-BAM-Slicing: Block-Abstraction Memorization and Slicing with Region-Based Dependency Analysis (Competition Contribution) --- InterpChecker: Reducing State Space via Interpolations (Competition Contribution) --- Map2Check using LLVM and KLEE (Competition Contribution) --- Symbiotic 5: Boosted Instrumentation (Competition Contribution) --- Ultimate Automizer and the Search for Perfect Interpolants (Competition Contribution) --- Ultimate Taipan with Dynamic Block Encoding (Competition Contribution) --- VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)
    Pages: Online-Ressource (XX, 465 pages) , 92 illustrations
    ISBN: 9783319899633
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Keywords: Computer science ; Computer hardware ; Computer organization ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Programming Languages, Compilers, Interpreters ; Theory of Computation ; Computer Systems Organization and Communication Networks ; Computer Hardware ; Computing Methodologies ; Computing Milieux
    Description / Table of Contents: Language Design --- Consistent Subtyping for All --- HOBiT: Programming Lenses without using Lens Combinators --- Dualizing Generalized Algebraic Data Types by Matrix Transposition --- Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach --- Probabilistic Programming --- An Assertion-Based Program Logic for Probabilistic Programs --- Fine-grained Semantics for Probabilistic Programs --- How long, O Bayesian network, will I sample thee? --- Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus --- Types and Effects --- Failure is Not an Option: An Exceptional Type Theory --- Let Arguments Go First --- Behavioural equivalence via modalities for algebraic effects --- Explicit Effect Subtyping --- Concurrency --- A separation logic for a promising semantics --- Logical Reasoning for Disjoint Permissions --- Deadlock-Free Monitors --- Fragment Abstraction for Concurrent Shape Analysis --- Security --- Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management --- Modular Product Programs --- Program Verification --- A Fistful of Dollars: Formalizing Asymptotic Complexity Claims via Deductive Program Verification --- Verified Learning Without Regret --- Program Verification by Coinduction --- Velisarios: Byzantine Fault Tolerant Protocols Powered by Coq --- Program Analysis and Automated Verification --- Evaluating Design Tradeoffs in Numeric Static Analysis for Java --- An Abstract Interpretation Framework for Input Data Usage --- Higher-Order Program Verification via HFL Model Checking --- Quantitative Analysis of Smart Contracts --- Session Types and Concurrency --- Session-Typed Concurrent Contracts --- A Typing Discipline for Statically Verified Crash Failure Handling in Distributed Systems --- On Polymorphic Sessions and Functions: A Tale of Two (Fully Abstract) Encodings --- Concurrent Kleene Algebra: Free Model and Completeness --- Concurrency and Distribution --- Correctness of a Concurrent Object Collector for Actor Languages --- Paxos Consensus, Deconstructed and Abstracted --- On Parallel Snapshot Isolation and Release/Acquire Consistency --- Eventual Consistency for CRDTs --- Compiler Verification --- A Verified Compiler from Isabelle/HOL to CakeML --- Compositional Verification of Compiler Optimisations on Relaxed Memory
    Pages: Online-Ressource (XVI, 1058 pages) , 276 illustrations
    ISBN: 9783319898841
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: Computer science ; Computers ; Education ; Computer Science ; Information Systems and Communication Service ; Education, general
    Description / Table of Contents: Innovative Technologies for an Engaging Classroom (iTEC) --- Development of the Future Classroom Toolkit --- Designing Edukata, a Participatory Design Model for Creating Learning Activities --- The iTEC Technical Artefacts, Architecture and Educational Cloud --- The Composer: Creating, Sharing and Facilitating Learning Designs --- Recommender Systems --- Resources beyond Content for Open Education --- The iTEC Widget Store --- The Impact and Potential of iTEC: Evidence from large-scale Validation in School Classrooms
    Pages: Online-Ressource (XVII, 201 pages) , 47 illustrations, 42 illustrations in color
    ISBN: 9783319193663
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: Computer science ; Computer organization ; Computers ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service
    Description / Table of Contents: Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers
    Pages: Online-Ressource (XXI, 360 pages) , 103 illustrations
    ISBN: 9781430266389
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Keywords: Computer science ; Logic design ; Computer organization ; Operating systems (Computers) ; Computers ; Computer Science ; Computing Methodologies ; Computer Systems Organization and Communication Networks ; Operating Systems ; Logic Design ; Information Systems and Communication Service
    Description / Table of Contents: HHVSF: A Framework to Accelerate Drug-based High-throughput Virtual Screening on High-Performance Computers --- HBasechainDB --- A Scalable Blockchain Framework on Hadoop Ecosystem --- DETOUR: A Large-Scale Non-Blocking Optical Data Center Fabric --- Querying Large Scientific Data Sets with Adaptable IO System ADIOS --- On the Performance of Spark on HPC Systems: Towards a Complete Picture --- Experiences of Converging Big Data Analytics Frameworks with High Performance Computing Systems --- MACC : An OpenACC Transpiler for Automatic Multi-GPU Use --- Acceleration of Wind Simulation using Locally Mesh-Refined Lattice Boltzmann Method on GPU-Rich supercomputers --- Architecture of an FPGA-Based Heterogeneous System for Code-Search Problems --- TINS: A Task-Based Dynamic Helper Core Strategy for In Situ Analytics --- Machine Learning Predictions for Underestimation of Job Runtime on HPC System --- A Power Management Framework with Simple DSL for Automatic Power-Performance Optimization on Power-Constrained HPC Systems --- Scalable Data Management of the Uintah Simulation Framework for Next-Generation Engineering Problems with Radiation --- High performance LOBPCG method for solving multiple eigenvalues of Hubbard model: Efficiency of communication avoiding Neumann expansion preconditioner --- Application of a preconditioned Chebyshev basis communication-avoiding conjugate gradient method to a multiphase thermal-hydraulic CFD code --- Optimization of Hierarchical matrix computation on GPU
    Pages: Online-Ressource (X, 293 pages) , 121 illustrations
    ISBN: 9783319699530
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Keywords: Computer science ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers ; Computer Science ; Systems and Data Security ; Theory of Computation ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Information Flow and Non-Intereference --- What's the Over/Under? Probabilistic Bounds on Information Leakage --- Secure Information Release in Timed Automata --- Compositional Non-Interference for Concurrent Programs via Separation and Framing --- The Meaning of Memory Safety --- Leakage, Information Flow, and Protocols --- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage --- Leakage and Protocol Composition in a Game-theoretic Perspective --- Equivalence Properties by Typing in Cryptographic Branching Protocols --- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience --- Smart Contracts and Privacy --- SoK: Unraveling Bitcoin Smart Contracts --- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts --- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts --- UniTraX: Protecting Data Privacy with Discoverable Biases --- Firewalls and Attack-Defense Trees --- Transcompiling Firewalls --- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Pages: Online-Ressource (XIV, 347 pages) , 85 illustrations
    ISBN: 9783319897226
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...