Narrow your search

Library

KU Leuven (10)

Odisee (9)

Thomas More Kempen (9)

Thomas More Mechelen (9)

UCLL (9)

ULB (9)

ULiège (9)

VIVES (9)

UGent (3)

KBC (2)

More...

Resource type

book (10)

periodical (1)


Language

English (11)


Year
From To Submit

2019 (2)

2016 (1)

2013 (1)

2012 (2)

2009 (1)

More...
Listing 1 - 10 of 11 << page
of 2
>>
Sort by
Predictably dependable computing systems
Authors: --- ---
ISBN: 3540593349 9783540593348 Year: 1995 Publisher: Berlin Springer

Cooperative Bug Isolation : Winning Thesis of the 2005 ACM Doctoral Dissertation Competition
Authors: ---
ISBN: 9783540718772 354071877X 9786610865727 1280865725 3540718788 Year: 2007 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half a century ago. In the intervening decades, the need for effective methods of understanding software has only increased; so- ware has spread to become the underpinning of much of modern society, and the potentially disastrous consequences of broken or poorly understood software have become all too apparent. Ben Liblit’s work reconsiders two common assumptions about how we should analyze software and it arrives at some striking new results. Inprinciple,understandingsoftware is not such a hardproblem. Certainlya c- puter scientist studying programs appears to be in a much stronger position than, say, a biologist trying to understand a living organism or an economist trying to understand the behavior of markets, because the biologist and the economist must rely on indirect observation of the basic processes they wish to understand. A c- puterscientist, however,starts with a complete,precise descriptionof the behaviorof software—the program itself! Of course, the story turns out not to be so straightf- ward, because despite having a perfect description, programs are suf ciently c- plex that it is usually dif cult or even impossible to answer many simple questions about them.


Book
Complex systems and dependability
Author:
ISBN: 3642306616 9786613942937 3642306624 1283630486 Year: 2012 Publisher: Heidelberg [Germany] : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Typical contemporary complex system is a multifaceted amalgamation of technical, information, organization, software and human (users, administrators and management) resources. Complexity of such a system comes not only from its involved technical and organizational structure but mainly from complexity of information processes that must be implemented in the operational environment (data processing, monitoring, management, etc.). In such case traditional methods of reliability analysis focused mainly on technical level are usually insufficient in performance evaluation and more innovative methods of dependability analysis must be applied which are based on multidisciplinary approach to theory, technology and maintenance of systems operating in real (and very often unfriendly) environments. This monograph presents selected new developments in such areas of dependability research as system modelling, tools and methodologies for system analysis, data security, secure system design and specific dependability aspects in specialized technical applications. Many practical cases illustrate the universal rule that complexity and multiplicity of system processes, their concurrency and their reliance on embedded intelligence (human and artificial) significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods.


Book
Broadband Communications, Networks, and Systems : 10th EAI International Conference, Broadnets 2019, Xi’an, China, October 27-28, 2019, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 3030364429 3030364410 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed post-conference proceedings of the 10th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2019, which took place in Xi’an, China, in October 2019. The 19 full papers presented were carefully reviewed and selected from 61 submissions. The papers are thematically grouped as follows: Wireless Networks and Applications, Communication and Sensor Networks, Internet of Things, Pervasive Computing, Security and Privacy.

Computer safety, reliability, and security : 25th international conference, SAFECOMP 2006, Gdansk, Poland, September 27-29, 2006 : proceedings
Authors: ---
ISBN: 9783540457626 3540457623 3540457631 Year: 2006 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Welcome to SAFECOMP 2006, the 25th International Conference on Computer Safety, Security and Reliability, held in Gdansk,Poland. Since it was established in 1979 by the European Workshop on Industrial Computer Systems, Technical Committee 7 on Safety, Reliability and Security (EWICS TC7), SAFECOMP has continuously contributed to the progress in high integrity applications of information technologies. The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability of critical IT systems and applications and serves as a platform for knowledge and technology transfer for researchers, industry (suppliers, operators, users), regulators and certi?ers of such systems. SAFECOMP provides ample opportunity to exchange insights and experiences on emerging methods, approaches and practical so- tions to safety, security and reliability problems across the borders of di?erent application domains and technologies. The SAFECOMP 2006 program re?ected in this book included 32 papers selected from 101 submissions of full texts. The submissions came from authors representing 26 di?erent countries from Europe, Asia, and North and South America. The 32 accepted papers were prepared by experts representing 14 d- ferent countries. The above data con?rm the broad and increasing interest in SAFECOMP and the topics addressed. The program was supplemented by three keynote presentations by outsta- ing invited experts (not included in this book). The keynotes focused on - terdisciplinary aspects of dependability of computer systems, practical aspects of application of safety standards and new challenges of information security research and development.

Keywords

Computer software --- Electronic digital computers --- Computer security --- Industrial safety --- Logiciels --- Ordinateurs --- Sécurité informatique --- Sécurité du travail --- Reliability --- Congresses. --- Fiabilité --- Congrès --- Computer Science --- Engineering & Applied Sciences --- Computer science. --- Special purpose computers. --- Software engineering. --- Coding theory. --- Computer logic. --- Management information systems. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Coding and Information Theory. --- Special Purpose and Application-Based Systems. --- Logics and Meanings of Programs. --- Management of Computing and Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer science logic --- Logic, Symbolic and mathematical --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Special purpose computers --- Computers --- Informatics --- Science --- Communication systems --- Logic design. --- Information Systems. --- Design, Logic --- Design of logic systems --- Electronic circuit design --- Logic circuits --- Switching theory --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Danzig <2006> --- Computer reliability --- Computer safety --- SAFECOMP


Book
Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II
Authors: --- --- --- --- --- et al.
ISBN: 3319470752 3319470744 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360° 2015, held in Rome, Italy, in October 2015. The IoT 360° is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 61 revised full papers at the following four conferences: International Conference on IoT as a Service, IoTaaS, International Conference on Mobility in IoT, Mobility IoT, International Conference on Sensor Systems and Software, S-Cube, International Conference on Interoperability in IoT, InterioT, International Conference on Software Defined and Virtual Future Wireless Networks, SDWNCT.


Book
Algebra, Codes and Cryptology : First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedings
Authors: --- --- ---
ISBN: 303036237X 3030362361 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents refereed proceedings of the First International Conference on Algebra, Codes and Cryptology, A2C 2019, held in Dakar, Senegal, in December 2019. The 14 full papers were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on non-associative and non-commutative algebra; code, cryptology and information security.

Keywords

Computers --- Computer networks --- Reliability. --- Access control. --- Computer reliability --- Computers. --- Computer communication systems. --- Data encryption (Computer science). --- Computer security. --- Numerical analysis. --- Optical data processing. --- Information Systems and Communication Service. --- Computer Communication Networks. --- Cryptology. --- Systems and Data Security. --- Numeric Computing. --- Image Processing and Computer Vision. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Mathematical analysis --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Optical equipment --- Protection --- Security measures --- Distributed processing


Book
Resilience assessment and evaluation of computing systems
Author:
ISBN: 3642436749 3642290310 3642290329 1283741938 Year: 2012 Publisher: Berlin ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of our daily life depend on the correct, reliable and secure operation of often large-scale distributed computing systems. Wolter and her co-editors grouped the 20 chapters from leading researchers into seven parts: an introduction and motivating examples, modeling techniques, model-driven prediction, measurement and metrics, testing techniques, case studies, and conclusions. The core is formed by 12 technical papers, which are framed by motivating real-world examples and case studies, thus illustrating the necessity and the application of the presented methods. While the technical chapters are independent of each other and can be read in any order, the reader will benefit more from the case studies if he or she reads them together with the related techniques. The papers combine topics like modeling, benchmarking, testing, performance evaluation, and dependability, and aim at academic and industrial researchers in these areas as well as graduate students and lecturers in related fields. In this volume, they will find a comprehensive overview of the state of the art in a field of continuously growing practical importance.

Keywords

Computer systems -- Evaluation -- Congresses. --- Computer software --- Computers --- Engineering & Applied Sciences --- Computer Science --- Reliability --- Reliability. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer reliability --- Software, Computer --- Computer science. --- Computer system failures. --- Software engineering. --- Mathematical statistics. --- Computer science --- Computer mathematics. --- Quality control. --- Industrial safety. --- Computer Science. --- System Performance and Evaluation. --- Probability and Statistics in Computer Science. --- Quality Control, Reliability, Safety and Risk. --- Software Engineering. --- Mathematical Applications in Computer Science. --- Mathematics. --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer system performance. --- System safety. --- Computer software engineering --- Engineering --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Informatics --- Science --- Prevention --- Computer science—Mathematics. --- Dependability --- Trustworthiness --- Conduct of life --- Factory management --- Industrial engineering --- Reliability (Engineering) --- Sampling (Statistics) --- Standardization --- Quality assurance --- Quality of products --- Mathematics --- Statistical inference --- Statistics, Mathematical --- Statistics --- Probabilities --- Computer mathematics --- Electronic data processing --- Industrial accidents --- Industries --- Job safety --- Occupational hazards, Prevention of --- Occupational health and safety --- Occupational safety and health --- Prevention of industrial accidents --- Prevention of occupational hazards --- Safety, Industrial --- Safety engineering --- Safety measures --- Safety of workers --- System safety --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Statistical methods --- Failures


Book
Security and dependability for ambient intelligence
Authors: --- ---
ISBN: 1441947000 0387887741 9786612126970 1282126970 038788775X Year: 2009 Publisher: New York ; London : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security and Dependability for Ambient Intelligence is the primary publication of the SERENITY approach, which provides security and dependability (S&D) solutions for dynamic, highly distributed, heterogeneous systems. The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a framework supporting the automated integration, configuration, monitoring and adaptation of security and dependability mechanisms. An edited volume contributed by world leaders in the field, this book covers the problems that the highly dynamic and heterogeneous nature of ambient intelligence systems poses to security and dependability and presents solutions to these problems. Security and Dependability for Ambient Intelligence is designed for researchers and practitioners focusing on the dynamic integration, deployment and verification of security and dependability solutions in highly distributed systems incorporating ambient intelligence features. It is also suitable as a reference or secondary text for advanced-level students in computer science and computer or electrical engineering. .

Keywords

Ambient intelligence. --- Computer security. --- Computers --Reliability. --- Ambient intelligence --- Computer security --- Computers --- Computer Science --- Engineering & Applied Sciences --- Reliability --- Reliability. --- Computer reliability --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- AmI (Ambient intelligence) --- Intelligence, Ambient --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer organization. --- Computer communication systems. --- Software engineering. --- Operating systems (Computers). --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Operating Systems. --- Software Engineering. --- Information Systems Applications (incl. Internet). --- Computer Systems Organization and Communication Networks. --- Data protection --- Security systems --- Hacking --- Computer operating systems --- Disk operating systems --- Systems software --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Organization, Computer --- Informatics --- Science --- Operating systems --- Distributed processing --- Human-computer interaction --- Ubiquitous computing --- Voice computing --- Computer network architectures. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
From Sounds to Music and Emotions : 9th International Symposium CMMR 2012, London, UK, June 19-22, 2012, Revised Selected Papers
Authors: --- --- ---
ISBN: 3642412475 3642412483 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Computer Music Modeling and Retrieval, CMMR 2012, held in London, UK, in June 2012. The 28 revised full papers presented were carefully reviewed and selected for inclusion in this volume. The papers have been organized in the following topical sections: music emotion analysis; 3D audio and sound synthesis; computer models of music perception and cognition; music emotion recognition; music information retrieval; film soundtrack and music recommendation; and computational musicology and music education. The volume also includes selected papers from the Cross-Disciplinary Perspectives on Expressive Performance Workshop held within the framework of CMMR 2012.

Keywords

Engineering & Applied Sciences --- Computer Science --- Computer science. --- Music. --- Special purpose computers. --- Information storage and retrieval. --- Multimedia information systems. --- User interfaces (Computer systems). --- Application software. --- Computer Science. --- Information Storage and Retrieval. --- Multimedia Information Systems. --- Computer Appl. in Arts and Humanities. --- User Interfaces and Human Computer Interaction. --- Special Purpose and Application-Based Systems. --- Computers --- Reliability. --- Computer reliability --- Multimedia systems. --- Information systems. --- Software engineering. --- Computer software engineering --- Engineering --- Informatics --- Science --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Art music --- Art music, Western --- Classical music --- Musical compositions --- Musical works --- Serious music --- Western art music --- Western music (Western countries) --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Special purpose computers --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 10 of 11 << page
of 2
>>
Sort by