Reliable Software Technologies – Ada-Europe 2018

Reliable Software Technologies – Ada-Europe 2018
Author: António Casimiro
Publisher: Springer
Total Pages: 179
Release: 2018-06-11
Genre: Computers
ISBN: 331992432X

Download Reliable Software Technologies – Ada-Europe 2018 Book in PDF, Epub and Kindle

This book constitutes the proceedings of the 23rd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2018, held in Lisbon, Portugal, in June 2018. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They were organized in topical sections named: safety and security; Ada 202X; handling implicit overhead; real-time scheduling; and new application domains.

Reliable Software Technologies Ada-Europe 2000

Reliable Software Technologies Ada-Europe 2000
Author: Hubertus B. Keller
Publisher: Springer
Total Pages: 316
Release: 2006-12-30
Genre: Computers
ISBN: 354045098X

Download Reliable Software Technologies Ada-Europe 2000 Book in PDF, Epub and Kindle

This book constitutes the proceedings of the 23rd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2018, held in Lisbon, Portugal, in June 2018. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They were organized in topical sections named: safety and security; Ada 202X; handling implicit overhead; real-time scheduling; and new application domains.

Dependable Computing - EDCC 2020 Workshops

Dependable Computing - EDCC 2020 Workshops
Author: Simona Bernardi
Publisher: Springer Nature
Total Pages: 226
Release: 2020-08-31
Genre: Computers
ISBN: 3030584623

Download Dependable Computing - EDCC 2020 Workshops Book in PDF, Epub and Kindle

This book constitutes refereed proceedings of the Workshops of the 16th European Dependable Computing Conference, EDCC: ​1st Workshop on Articial Intelligence for Railways, AI4RAILS 2020, 1st Worskhop on Dynamic Risk Management for Autonomous Systems, DREAMS 2020, 2nd Workshop on Dependable Solutions for Intelligent Electricity Distribution Grids, DSOGRI 2020, 12th Workshop on Software Engineering for Resilient Systems, SERENE 2020, held in September 2020. Due to the COVID-19 pandemic the workshops were held virtually. The 12 full papers and 4 short papers were thoroughly reviewed and selected from 35 submissions. The workshop papers complement the main conference topics by addressing dependability or security issues in specic application domains or by focussing in specialized topics, such as system resilience.

Reliable Software Technologies -- Ada-Europe 2013

Reliable Software Technologies -- Ada-Europe 2013
Author: Hubert B. Keller
Publisher: Springer
Total Pages: 187
Release: 2013-05-27
Genre: Computers
ISBN: 3642386016

Download Reliable Software Technologies -- Ada-Europe 2013 Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 18th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2013, was held in Berlin, Germany, in June 2013. The 11 full papers presented were carefully reviewed and selected from various submissions. They are organized in topical sections on multi-core and distributed systems; Ada and Spark; dependability; and real-time systems.

ITNG 2022 19th International Conference on Information Technology-New Generations

ITNG 2022 19th International Conference on Information Technology-New Generations
Author: Shahram Latifi
Publisher: Springer Nature
Total Pages: 391
Release: 2022-05-03
Genre: Computers
ISBN: 3030976521

Download ITNG 2022 19th International Conference on Information Technology-New Generations Book in PDF, Epub and Kindle

This volume represents the 19th International Conference on Information Technology - New Generations (ITNG), 2022. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, and service award. . This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.

Proceedings of 6th International Conference in Software Engineering for Defence Applications

Proceedings of 6th International Conference in Software Engineering for Defence Applications
Author: Paolo Ciancarini
Publisher: Springer
Total Pages: 334
Release: 2019-03-18
Genre: Technology & Engineering
ISBN: 3030146871

Download Proceedings of 6th International Conference in Software Engineering for Defence Applications Book in PDF, Epub and Kindle

This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational evolution, and business intelligence systems. The contents are based on presentations delivered at SEDA 2018, the 6th International Conference in Software Engineering for Defence Applications, which was held in Rome, Italy, in June 2018. This conference series represents a targeted response to the growing need for research that reports and debates the practical implications of software engineering within the defence environment and also for software performance evaluation in real settings through controlled experiments as well as case and field studies. The book will appeal to all with an interest in modeling, managing, and implementing defence-related software development products and processes in a structured and supportable way.

Quality-of-Service Aware Design and Management of Embedded Mixed-Criticality Systems

Quality-of-Service Aware Design and Management of Embedded Mixed-Criticality Systems
Author: Behnaz Ranjbar
Publisher: Springer Nature
Total Pages: 205
Release: 2023-10-28
Genre: Technology & Engineering
ISBN: 3031389603

Download Quality-of-Service Aware Design and Management of Embedded Mixed-Criticality Systems Book in PDF, Epub and Kindle

This book addresses the challenges associated with efficient Mixed-Criticality (MC) system design. We focus on application analysis through execution time analysis and task scheduling analysis in order to execute more low-criticality tasks in the system, i.e., improving the Quality-of-Service (QoS), while guaranteeing the correct execution of high-criticality tasks. Further, this book addresses the challenge of enhancing QoS using parallelism in multi-processor hardware platforms.

Systematic Transformation Method from UML to Event-B

Systematic Transformation Method from UML to Event-B
Author: Zou Sheng-Rong, Geng Xue, Yao Ju-Yi, Liu Xiao-Ying, Zhi Yu-Hua
Publisher: Scientific Research Publishing, Inc. USA
Total Pages: 101
Release: 2024-06-05
Genre: Antiques & Collectibles
ISBN: 1649979134

Download Systematic Transformation Method from UML to Event-B Book in PDF, Epub and Kindle

Since the emergence of software engineering in the late 1960s, require-ments analysis has always been an important theme of software development. In the process of software development, many people are needed to coop-erate to ensure the stability and reliability of the software. According to the degree of formalization in the software development process, software en-gineering methods can be divided into three types: non-formal, semi-formal and formal. In object- oriented software development, UML has become a de facto modeling standard. However, although UML is intuitive and easy to understand and apply, it has inaccurate semantics, and UML is a semi-formal modeling language that cannot be formally verified. Event-B is a formal method based on a large number of mathematical predicate logic, which is accurate but difficult to understand and apply. Therefore, how to combine the advantages of UML diagrams and Event- B methods is the focus of re-search.

Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security
Author: Charles A. Kamhoua
Publisher: John Wiley & Sons
Total Pages: 546
Release: 2021-09-15
Genre: Technology & Engineering
ISBN: 1119723922

Download Game Theory and Machine Learning for Cyber Security Book in PDF, Epub and Kindle

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.