Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Mathematical logic --- Logic --- Computer science --- Programming --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- vormgeving --- ontwerpen --- simulaties --- programmeren (informatica) --- programmeertalen --- wiskunde --- software engineering
Choose an application
This book constitutes the refereed proceedings of the 6th International Conference on Test and Proofs, TAP 2012, held in Prague, Czech Republic, in May/June 2012, as part of the TOOLS 2012 Federated Conferences. The 9 revised full papers presented together with 2 invited papers, 4 short papers and one tutorial were carefully reviewed and selected from 29 submissions. The papers are devoted to the convergence of tests and proofs for developing novel techniques and application that support engineers in building secure, safe, and reliable systems. Among the topics covered are model-based testing; scenario-based testing; complex data structure generation; and the validation of protocols and libraries.
Computer software --- Formal methods (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Testing --- Verification --- Information Technology --- Software Engineering --- Computer science. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Computer logic. --- Mathematical logic. --- Computer simulation. --- Computer Science. --- Software Engineering. --- Programming Techniques. --- Logics and Meanings of Programs. --- Mathematical Logic and Formal Languages. --- Programming Languages, Compilers, Interpreters. --- Simulation and Modeling. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Algebra of logic --- Logic, Universal --- Mathematical logic --- Symbolic and mathematical logic --- Symbolic logic --- Mathematics --- Algebra, Abstract --- Metamathematics --- Set theory --- Syllogism --- Computer science logic --- Logic, Symbolic and mathematical --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Informatics --- Science --- Programming --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory
Choose an application
This book constitutes the refereed proceedings of the 6th International Conference on Test and Proofs, TAP 2012, held in Prague, Czech Republic, in May/June 2012, as part of the TOOLS 2012 Federated Conferences. The 9 revised full papers presented together with 2 invited papers, 4 short papers and one tutorial were carefully reviewed and selected from 29 submissions. The papers are devoted to the convergence of tests and proofs for developing novel techniques and application that support engineers in building secure, safe, and reliable systems. Among the topics covered are model-based testing; scenario-based testing; complex data structure generation; and the validation of protocols and libraries.
Mathematical logic --- Logic --- Computer science --- Programming --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- vormgeving --- ontwerpen --- simulaties --- programmeren (informatica) --- programmeertalen --- wiskunde --- software engineering
Choose an application
The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing. This state-of-the-art survey illustrates the results of the Aniketos – Secure and Trustworthy Composite Services – project (funded under the EU 7th Research Framework Programme). The papers included in the book describe the solutions developed during the 4-year project to establish and maintain trustworthiness and secure behavior in a constantly changing service environment. They provide service developers and providers with a secure service development framework that includes methods, tools, and security services supporting the design-time creation and run-time composition of secure dynamic services, where both the services and the threats are evolving. The 16 chapters are organized in the following thematic sections: state of the art of secure and trustworthy composite services; the Aniketos platform; design-time support framework; run-time support framework; and case studies and evaluation.
Computer science. --- Information technology. --- Business --- Computer communication systems. --- Software engineering. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- IT in Business. --- Computer Communication Networks. --- Data processing. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Protection --- Security measures --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Business—Data processing. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Choose an application
The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developing and deploying services are well established, methods for ensuring trust and security are fewer and less mature. Lack of trust and confidence in composed services and in their constituent parts is reckoned to be one of the significant factors limiting widespread uptake of service-oriented computing. This state-of-the-art survey illustrates the results of the Aniketos – Secure and Trustworthy Composite Services – project (funded under the EU 7th Research Framework Programme). The papers included in the book describe the solutions developed during the 4-year project to establish and maintain trustworthiness and secure behavior in a constantly changing service environment. They provide service developers and providers with a secure service development framework that includes methods, tools, and security services supporting the design-time creation and run-time composition of secure dynamic services, where both the services and the threats are evolving. The 16 chapters are organized in the following thematic sections: state of the art of secure and trustworthy composite services; the Aniketos platform; design-time support framework; run-time support framework; and case studies and evaluation.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- bedrijfseconomie --- computers --- informatica --- informatiesystemen --- software engineering --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
Listing 1 - 6 of 6 |
Sort by
|