ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (10)
  • Journals
  • System Performance and Evaluation  (7)
  • Computers and civilization
  • Cham : Springer  (10)
  • Computer Science  (10)
  • Geography
  • 1
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Computer system failures ; Software engineering ; Data structures (Computer science) ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Theorem Proving --- Unification with Abstraction and Theory Instantiation in Saturation-based Reasoning --- Efficient verification of imperative programs using auto2 --- Frame Inference for Inductive Entailment Proofs in Separation Logic --- Verified Model Checking of Timed Automata --- SAT and SMT I --- Chain Reduction for Binary and Zero-Suppressed Decision Diagrams --- CDCLSym: Introducing E_ective Symmetry Breaking in SAT Solving --- Automatic Generation of Precise and Useful Commutativity Conditions --- Bit-Vector Model Counting using Statistical Estimation --- Deductive Verification --- Hoare Logics for Time Bounds --- A Verified Implementation of the Bounded List Container --- Automating Deductive Verification for Weak-Memory Programs --- Software Verification and Optimisation --- Property Checking Array Programs Using Loop Shrinking --- Invariant Synthesis for Incomplete Verification Engines --- Accelerating Syntax-Guided Invariant Synthesis --- Daisy - Framework for Analysis and Optimization of Numerical Programs --- Model Checking --- Oink: an Implementation and Evaluation of Modern Parity Game Solvers --- More Scalable LTL Model Checking via Discovering Design-Space Dependencies (D^3) --- Generation of Minimum Tree-like Witnesses for Existential CTL --- From Natural Projection to Partial Model Checking and Back --- Machine Learning --- ICE-based Refinement Type Discovery for Higher-Order Functional Programs --- Strategy Representation by Decision Trees in Reactive Synthesis --- Feature-Guided Black-Box Safety Testing of Deep Neural Networks.
    Pages: Online-Ressource (XX, 429 pages) , 93 illustrations
    ISBN: 9783319899602
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers ; Computer Science ; Systems and Data Security ; Theory of Computation ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Information Flow and Non-Intereference --- What's the Over/Under? Probabilistic Bounds on Information Leakage --- Secure Information Release in Timed Automata --- Compositional Non-Interference for Concurrent Programs via Separation and Framing --- The Meaning of Memory Safety --- Leakage, Information Flow, and Protocols --- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage --- Leakage and Protocol Composition in a Game-theoretic Perspective --- Equivalence Properties by Typing in Cryptographic Branching Protocols --- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience --- Smart Contracts and Privacy --- SoK: Unraveling Bitcoin Smart Contracts --- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts --- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts --- UniTraX: Protecting Data Privacy with Discoverable Biases --- Firewalls and Attack-Defense Trees --- Transcompiling Firewalls --- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Pages: Online-Ressource (XIV, 347 pages) , 85 illustrations
    ISBN: 9783319897226
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Management ; Industrial management ; Information storage and retrieval ; Application software ; Computers and civilization ; Computer Science ; Information Storage and Retrieval ; Innovation/Technology Management ; Computer Applications ; Computers and Society
    Description / Table of Contents: Part I: The Big Data Opportunity --- The Big Data Value Opportunity --- Introduction to the BIG Project --- Part II: The Big Data Value Chain: Enabling and Value Creating Technologies --- The Big Data Value Chain: Definitions, Concepts, and Theoretical Approaches --- Big Data Acquisition --- Big Data Analysis --- Big Data Curation --- Big Data Storage --- Big Data Usage --- Part III: Usage and Exploitation of Big Data --- Big Data Driven Innovation in Industrial Sectors --- Big Data in the Health Sector --- Big Data in the Public Sector --- Big Data in the Finance and Insurance Sectors --- Big Data in the Energy and Transport Sectors --- Big Data in the Media and Entertainment Sectors --- Part IV: A Roadmap for Big Data Research --- Cross-Sectorial Requirements Analysis for Big Data Research --- New Horizons for a Data-Driven Economy: Roadmaps and Action Plans for Technology, Businesses, Policy, and Society.                        
    Pages: Online-Ressource (XX, 303 pages) , 34 illustrations
    ISBN: 9783319215693
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Research ; Moral and ethical aspects ; Computers ; Computers and civilization ; Computer Science ; Computers and Society ; History of Computing ; Diversity Management/Women in Business ; Research Ethics
    Description / Table of Contents: Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science --- On the Big Impact of “Big Computer Science” --- On Informatics, Diamonds and T --- Leadership and Balance in Research --- Rational ethics --- Ethics for the digital age: where are the moral specs? --- Digital Sovereignty and IT-Security for a Prosperous Society --- Women in Computing and the contingency of informatics cultures --- Ada - poet of computing
    Pages: Online-Ressource (XI, 109 pages) , 22 illustrations in color
    ISBN: 9783319557359
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Computers ; Computers and civilization ; Computer Science ; History of Computing ; User Interfaces and Human Computer Interaction ; Computer Appl. in Arts and Humanities ; Computers and Society
    Description / Table of Contents: Once Neglected, Now Emerging and Absolutely Necessary: On the History of Digital Humanities or An Introduction --- Why Oral History? ---  ‘Individuation is There in all the Different Strata:’ an Oral History Conversation between John Burrows, Hugh Craig and Willard McCarty --- ‘It was a Time When the University was Still Taking Account of the Meaning of universitas scientiarum’: an Oral History Conversation between Wilhelm Ott and Julianne Nyhan --- ‘hic Rhodus, hic salta’: An Oral History Interview Between Tito Orlandi and Julianne Nyhan --- ‘They Took a Chance’: An Oral History Conversation between Susan Hockey and Julianne Nyhan ---  ‘And Here We go Back Again to the Influence of Algorithmic Thinking’: An Oral History conversation between Judy Malloy and Julianne Nyhan --- ‘I Would Think of Myself as Sitting Inside the Computer, Moving Things Around in Order to Accomplish the Goal of my Programming’: An Oral History Conversation Between Mary Dee Harris and Julianne Nyhan --- ‘I Was Absolutely Convinced That There Had to be a Better Way’: An Oral History Conversation Between John Nitti and Julianne Nyhan --- ‘It’s a Little Mind-Boggling Actually’: An Oral History Conversation between Helen Agüera and Julianne Nyhan ---  ‘I Heard About the Arrival of the Computer’: An Oral History Conversation Between Hans Rutimann and Julianne Nyhan ---  ‘Langezeit habe ich der Universitaet nachgetrauert’: An Oral History Conversation between Michael Sperberg-McQueen and Julianne Nyhan.-‘It’s Probably the Only Modestly Widely used System with a Command Language in Latin’: An Oral History Conversation Between Manfred Thaller and Julianne Nyhan ---  ‘I was Keen on Getting Computers into Humanists’ Thinking’: An Oral History Conversation Between John Bradley and Julianne Nyhan ---  ‘Moderate Expectations, Tolerable Disappointments’: An Oral History Conversation between Claus Huitfeldt and Julianne Nyhan --- ‘So, Into the Chopper it Went’: An Oral History Conversation between Gabriel Egan and Julianne Nyhan --- Revolutionaries and Underdogs --- By Way of a Conclusion
    Pages: Online-Ressource (XI, 285 pages)
    ISBN: 9783319201702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science ; Computer communication systems ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers and civilization ; Computer Science ; Computer Communication Networks ; Systems and Data Security ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation ; Computers and Society ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Making Flow-Based Security Detection Parallel --- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts --- Achieving Reproducible Network Environments with INSALATA --- Towards a Software-Defined Security Framework for Supporting Distributed Cloud --- Optimal Service Function Chain Composition in Network Functions Virtualization --- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services --- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications --- Towards Internet Scale Quality-of-Experience Measurement with Twitter --- Hunting SIP Authentication Attacks Efficiently --- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks --- Flow-Based Detection of IPv6-specific Network Layer Attacks --- Towards a Hybrid Cloud Platform Using Apache Mesos --- Visual Analytics for Network Security and Critical Infrastructures --- Preserving Relations in Parallel Flow Data Processing --- SmartDEMAP: A Smart Contract Deployment and Management Platform --- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads --- Situational Awareness: Detecting Critical Dependencies and Devices in a Network --- A Framework for SFC Integrity in NFV Environments --- Multi-domain DDoS Mitigation based on Blockchains
    Pages: Online-Ressource (XX, 192 pages) , 55 illustrations
    ISBN: 9783319607740
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Health informatics ; Computer system failures ; Image processing ; Computer Science ; Health Informatics ; Health Informatics ; Image Processing and Computer Vision ; System Performance and Evaluation
    Description / Table of Contents: VISCERAL: Evaluation-as-a-Service for Medical Imaging --- Using the Cloud as a Platform for Evaluation and Data Preparation --- Ethical and Privacy Aspects of Using Medical Image Data --- Annotating Medical Image Data --- Datasets created in VISCERAL --- Evaluation Metrics for Medical Organ Segmentation and Lesion Detection --- VISCERAL Anatomy Benchmarks for Organ Segmentation and Landmark Localisation: Tasks and Results --- Retrieval of Medical Cases for Diagnostic Decisions: VISCERAL Retrieval Benchmark --- Automatic Atlas-Free Multi-Organ Segmentation of Contrast-Enhanced CT Scans --- Multi-organ Segmentation Using Coherent Propagating Level Set Method Guided by Hierarchical Shape Priors and Local Phase Information --- Automatic Multi-organ Segmentation using Hierarchically-Registered Probabilistic Atlases --- Multi-Atlas Segmentation Using Robust Feature-Based Registration --- Combining Radiology Images and Clinical Meta-data for Multimodal Medical Case-based Retrieval --- Text and Content-based Medical Image Retrieval in the VISCERAL Retrieval Benchmark
    Pages: Online-Ressource (XVIII, 254 pages) , 93 illustrations, 39 illustrations in color
    ISBN: 9783319496443
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Computer system failures ; Coding theory ; E-commerce ; Computer Science ; Computer Communication Networks ; System Performance and Evaluation ; Special Purpose and Application-Based Systems ; Information Systems Applications (incl. Internet) ; Coding and Information Theory ; e-Commerce/e-business
    Description / Table of Contents: State-of-the-Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services --- Context Monitoring for Improved System Performance and QoE --- QoE Management for Future Networks --- Scalable Traffic Quality and System Efficiency Indicators towards Overall Telecommunication System's QoE Management --- Lag Compensation for First Person Shooter Games in Cloud Gaming --- The Value of Context-awareness in Bandwidth-challenging HTTP Adaptive Streaming Scenarios --- Conceptual and Analytical Models for Predicting the Quality of Service of Overall Telecommunication Systems --- QoS-based Elasticity for Service Chains in Distributed Edge Cloud Environments --- Integrating SDN and NFV with QoS-aware Service Composition --- Energy vs. QoX Network- and Cloud Services Management --- Traffic Management for Cloud Federation --- Efficient Simulation of IoT Cloud Use Cases --- Security of Internet of Things for Reliable Internet of Services --- TCP performance over current cellular access: A comprehensive analysis
    Pages: Online-Ressource (XVI, 401 pages) , 120 illustrations
    ISBN: 9783319904153
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...