Dependable Software Engineering: Theories, Tools, and Applications, Xuandong Li; Zhiming Liu; Wang Yi
Автор: Rog?rio de Lemos; Jean-Charles Fabre; Cristina Gac Название: Architecting Dependable Systems VI ISBN: 3642102476 ISBN-13(EAN): 9783642102479 Издательство: Springer Рейтинг: Цена: 10480.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Roger Lee; Naohiro Ishii Название: Software Engineering Research, Management and Applications 2009 ISBN: 3642261108 ISBN-13(EAN): 9783642261107 Издательство: Springer Рейтинг: Цена: 29209.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The 2009 SERA Conference covered theory and practice in many areas of software engineering including formal methods and tools, requirements engineering, computer security, database retrieval and more. This book offers 17 papers voted as best of the conference.
Автор: Roger Lee; Naohiro Ishii Название: Software Engineering Research, Management and Applications 2009 ISBN: 3642054404 ISBN-13(EAN): 9783642054402 Издательство: Springer Рейтинг: Цена: 29209.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The 2009 SERA Conference covered theory and practice in many areas of software engineering including formal methods and tools, requirements engineering, computer security, database retrieval and more. This book offers 17 papers voted as best of the conference.
Автор: Roger Lee; Alain Abran; Olga Ormandjieva; Constant Название: Software Engineering Research, Management and Applications 2010 ISBN: 3642422462 ISBN-13(EAN): 9783642422461 Издательство: Springer Рейтинг: Цена: 23757.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Towards Autonomic Specification of Distributed MARF with ASSL: Self-healing.- Repairing Service Compositions in a Changing World.- Remote Automated User Testing: First Steps toward a General-Purpose Tool.- Stepwise Design of BPEL Web Services Compositions: An Event_B Refinement Based Approach.- Code Generation for Autonomic Systems with ASSL.- A UML Based Deployment and Management Modeling for Cooperative and Distributed Applications.- Development of Mobile Location-Based Systems with Component.- A New Compound Metric for Software Risk Assessment.- Towards a Tool Support for Specifying Complex Software Systems by Categorical Modeling Language.- A Survey on the Importance of Some Economic Factors in the Adoption of Open Source Software.- Verification of the Correctness in Composed UML Behavioural Diagrams.- Development of Mobile Agent on CBD.- Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.- Study of One Dimensional Molecular Properties Using Python.- Comparing the Estimation Performance of the EPCU Model with the Expert Judgment Estimation Approach Using Data from Industry.- Investigating the Capability of Agile Processes to Support Life-Science Regulations: The Case of XP and FDA Regulations with a Focus on Human Factor Requirements.
Описание: This book constitutes the refereed proceedings of the Second International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2016, held in Beijing, China, in November 2016.The 17 full papers presented together with 3 short papers were carefully reviewed and selected from 58 submissions. The aim of the symposium is to bring together international researchers and practitioners in the field of software technology. Its focus is on formal methods and advanced software technologies, especially for engineering complex, large-scale artifacts like cyber-physical systems, networks of things, enterprise systems, or cloud-based services.
Автор: Kim Guldstrand Larsen; Oleg Sokolsky; Ji Wang Название: Dependable Software Engineering. Theories, Tools, and Applications ISBN: 3319694820 ISBN-13(EAN): 9783319694825 Издательство: Springer Рейтинг: Цена: 9083.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2017, held in Changsha, China, in October2017.The 19 full papers presented together with 3 invited talks were carefully reviewed and selected from 31 submissions.
Автор: John F. Meyer; Richard D. Schlichting Название: Dependable Computing for Critical Applications 2 ISBN: 3709192005 ISBN-13(EAN): 9783709192009 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume contains the papers presented at the Second International Work- ing Conference on Dependable Computing for Critical Applications, sponsored by IFIP Working Group lOA and held in Tucson, Arizona on February 18-20, 1991.
Автор: Carl E. Landwehr; Brian Randell; Luca Simoncini Название: Dependable Computing for Critical Applications 3 ISBN: 3709140110 ISBN-13(EAN): 9783709140116 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The Third IFIP International Working Conference on Dependable Computing for Critical Applications, like its predecessors, addressed various aspects of computer system dependability, a broad term defined as the degree of trust that may justifiably be placed in a system`s reliability, availability, safety, security, and performance.
Автор: Flaviu Cristian; Gerard LeLann; Teresa Lunt Название: Dependable Computing for Critical Applications 4 ISBN: 3709193982 ISBN-13(EAN): 9783709193983 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume contains the articles presented at the Fourth InternationallFIP Working Conference on Dependable Computing for Critical Applications held in San Diego, California, on January 4-6, 1994.
Holistic model for HTTP botnet detection based on DNS traffic analysis.- Detecting broad length algorithmically generated domains.- Secure cloud computing: multithreaded fully homomorphic encryption for legal metrology.- Detecting command and control channel of botnets in clouds.- An experimental framework for investigating security and privacy of IoT devices.- Dynamic cypher for enhanced cryptography and communication for Internet of Things.- An inter-device authentication scheme for smart homes using one-time-password over infrared channel.- Detection and prevention of blackhole attacks in wireless sensor networks.- Detection of online fake news using N-gram analysis and machine learning techniques.- Security protocol of social payment apps.- Spectral-spatial classification of hyperspectral imagery using support vector and Fuzzy-MRF.- Infant monitoring system using wearable sensors based on blood oxygen saturation.- Network behavioral analysis for zero-day malware detection. Network Behavioral Analysis for Zero-day Malware Detection.
Описание: With practical examples from industry, this volume introduces the methods and tools adopted by the critical systems industry, which includes air traffic control and space exploration. It features `off-the-shelf` systems designed by world-beating companies.
DDoS 3.0 - How terrorists bring down the Internet.- SGsim: Co-Simulation Framework for ICT-Enabled Power Distribution Grids.- Improving Cross-Traffic Bounds in Feed-Forward Networks -- There is a Job for Everyone.- Stochastic analysis of energy consumption in pool depletion systems.- Moving queue on a network.- A Multi-commodity Simulation Tool Based on TRIANA.- Performance and Precision of Web Caching Simulations for Zipf Request Pattern.- PSTeC: A Location-time Driven Modelling Formalism for Probabilistic Real-time Systems.- Analysis of Hierarchical Semi-Markov Processes with Parallel Regions.- Combining Mobility Models with Arrival Processes.- Product Line Fault Tree Analysis by Means of Multi-valued Decision Diagrams.- Resolving Contention for Networks-on-Chips: Combining Time-triggered Application Scheduling with Dynamic Budgeting of Memory Bus Use.- The Weak Convergence of TCP Bandwidth Sharing.- Analysis of Mitigation Measures for Timing Attacks in Mobile Offloading Systems.- Capabilities of Raspberry Pi 2 for Big Data and Video Streaming Applications in Data Centres.- Ensemble-Based Uncertainty Quantification for Smart Grid Co-Simulation.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru