Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
A ubiquitous challenge in many technical applications is to estimate an unknown state by means of data that stems from several, often heterogeneous sensor sources. In this book, information is interpreted stochastically, and techniques for the distributed processing of data are derived that minimize the error of estimates about the unknown state. Methods for the reconstruction of dependencies are proposed and novel approaches for the distributed processing of noisy data are developed.
Schätztheorie --- Kalman Filter --- estimation theory --- Sensornetze --- Verteilte SystemsData fusion --- distributed systems --- Datenfusion --- sensor networks --- Kalman filtering
Choose an application
State estimation of an unknown number of objects remains a challenging topic - despite the existence of theoretically bayes-optimal multi-object-filters - due to numerous assumptions in the modeling process. This thesis evaluates such filters in real multi-object-multi-sensor scenarios and proposes necessary extensions to existing models. The main application of the thesis is indoor pedestrian tracking.
Multi-Objekt-Verfolgung --- verteilte Systeme --- SensorenMulti-object-tracking --- sensors --- Objektklassifikation --- object classification --- pedestrian tracking --- distributed systems --- Personenverfolgung
Choose an application
The 14 chapters presented in this book cover a wide variety of representative works ranging from hardware design to application development. Particularly, the topics that are addressed are programmable and reconfigurable devices and systems, dependability of GPUs (General Purpose Units), network topologies, cache coherence protocols, resource allocation, scheduling algorithms, peertopeer networks, largescale network simulation, and parallel routines and algorithms. In this way, the articles included in this book constitute an excellent reference for engineers and researchers who have particular interests in each of these topics in parallel and distributed computing.
Electronic data processing --- High performance computing. --- Distributed processing. --- HPC (Computer science) --- Cyberinfrastructure --- Supercomputers --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Distributed systems
Choose an application
This issue of Proceedings gathers papers presented at XOVETIC2019 (A Coruña, Spain, 5-6 September 2019), a conference with the main goal of bringing together young researchers working in big data, artificial intelligence, Internet of Things, HPC(High-performance computing), cybersecurity, bioinformatics, natural language processing, 5G and others areas from the field of ICT (Information Communications Technology), and offering a platform to present the results of their research to a national audience in Galicia and north of Portugal. This second edition aims to serve as the basis of this event, which will be consolidated over time and acquire international projection. The conference is co-funded by Xunta de Galicia and European Union. European Regional Development Fund (ERDF).
High Performance Computing (HPC) --- Smart Systems --- movement localization and monitoring --- Big Data --- Recommendation systems --- Cybersecurity --- artificial vision --- Optimization --- data recovery --- Distributed systems --- Machine learning --- Applied Mathematics --- Artificial intelligence --- Bioinformatics --- Medical informatics --- Geographic information systems --- Statistics and Operative Investigation
Choose an application
In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.
Electronic digital computers. --- Electronic digital computers --- Automatic digital computers --- Computers, Electronic digital --- Digital computers, Electronic --- Computers --- Hybrid computers --- Sequential machine theory --- Reliability. --- Automatic control engineering --- Distributed systems --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This open access book constitutes the proceedings of the 31st European Symposium on Programming, ESOP 2022, which was held during April 5-7, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022. The 21 regular papers presented in this volume were carefully reviewed and selected from 64 submissions. They deal with fundamental issues in the specification, design, analysis, and implementation of programming languages and systems
Computer programming --- Programming languages (Electronic computers) --- automata theory --- computer programming --- computer systems --- databases --- distributed computer systems --- distributed systems --- embedded systems --- formal languages --- formal logic --- linguistics --- ontologies --- parallel processing systems --- program compilers --- programming languages --- semantics --- software design --- software engineering --- software quality --- verification --- Programació (Ordinadors) --- Llenguatges de programació
Choose an application
This open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following topical sections: Part I: Invited papers; formal methods for probabilistic programs; formal methods for neural networks; software Verification and model checking; hyperproperties and security; formal methods for hardware, cyber-physical, and hybrid systems. Part II: Probabilistic techniques; automata and logic; deductive verification and decision procedures; machine learning; synthesis and concurrency. This is an open access book.
Computer software --- Verification --- architecting --- architecture verification and validation --- artificial intelligence --- computer programming --- computer science --- computer systems --- distributed computer systems --- distributed systems --- embedded systems --- formal logic --- mathematics --- model checking --- programming languages --- software architecture --- software design --- software engineering --- software quality --- theoretical computer science --- verification --- verification and validation
Choose an application
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics.
Computer security --- Cybersecurity, AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, security architectures, system and data integrity, trust management systems, distributed systems security and dynamic risk management
Choose an application
This book contains collections of selected articles presented at the SDEWES2021 conference and subsequently published in a special issue of Sustainability. The book provides state-of-the-art research, overviewing practices in sustainable development, energy, water and environment systems, as well as their uses and applications. Focus is given to waste management; higher biomass production; biorefineries; bio-digital interface and microbial fuel cells; energy and cost reduction in the building sector; and the economic impact of sustainability.
Research & information: general --- biorefineries --- hemicellulose --- lignin --- liquid hot water --- wheat straw --- Chlorella sorokiniana --- heterotrophic --- anaerobic digestate --- glycerol --- FAME --- electrodialysis --- erythritol downstream --- desalination --- waste reduction --- current efficiency --- colloidal particles --- biorefinery --- organosolv --- precipitation --- self-assembly --- solvent shifting --- sustainable built environment --- microbial fuel cell --- bio-digital interface --- adaptive dynamic cell reconfiguration --- on-site net-zero electricity --- energy-positive buildings --- active integrated facades --- thermal storage --- distributed systems --- exergy management --- Africa --- petroleum investment --- entropy weight --- information entropy --- uncertainty measure --- n/a
Choose an application
This open access two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer Aided Verification, CAV 2021, held virtually in July 2021. The 63 full papers presented together with 16 tool papers and 5 invited papers were carefully reviewed and selected from 290 submissions. The papers were organized in the following topical sections: Part I: invited papers; AI verification; concurrency and blockchain; hybrid and cyber-physical systems; security; and synthesis. Part II: complexity and termination; decision procedures and solvers; hardware and model checking; logical foundations; and software verification. This is an open access book.
Software Engineering --- Artificial intelligence --- Computer programming / software development --- Mathematical theory of computation --- Computer modelling & simulation --- architecture verification --- artificial intelligence --- automata theory --- computer programming --- distributed computer systems --- distributed systems --- embedded systems --- formal languages --- formal logic --- formal methods --- model checking --- software architecture --- software design --- software engineering --- software quality --- temporal logic --- verification techniques --- Software engineering. --- Artificial intelligence. --- Computer science. --- Machine theory. --- Computer simulation. --- Software Engineering. --- Artificial Intelligence. --- Computer Science Logic and Foundations of Programming. --- Formal Languages and Automata Theory. --- Computer Modelling. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Abstract automata --- Abstract machines --- Automata --- Mathematical machine theory --- Algorithms --- Logic, Symbolic and mathematical --- Recursive functions --- Robotics --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering
Listing 1 - 10 of 20 | << page >> |
Sort by
|