-
DISPONIBILITÀ IMMEDIATA
{{/disponibilitaBox}}
-
{{speseGratisLibroBox}}
{{/noEbook}}
{{^noEbook}}
-
Libro
-
Theory and Applications of Dependable Computer Systems
zamojski wojciech (curatore); mazurkiewicz jacek (curatore); sugier jaroslaw (curatore); walkowiak tomasz (curatore); kacprzyk janusz (curatore)
162,98 €
154,83 €
{{{disponibilita}}}
TRAMA
This book presents selected papers from the Fifteenth International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX), which illustrate the diversity of theoretical problems in analysis of performability, reliability and security of contemporary computer systems. Covering also methodologies and practical tools involved in this field, it is a valuable reference resource for scientists, researchers, practitioners and students who are dealing with these subjects.Established in 2006, DepCoS-RELCOMEX is an annual conference series organised by Wroclaw University of Science and Technology. It focuses on the dependability and performability of contemporary computer systems – topics that can provide solutions to new challenges in evaluation of their reliability and efficiency. Since they are probably the most complex technical systems ever engineered by humans, the organization of modern computer systems cannot be modelled and analysed solelyas structures (however complex and distributed) built only on the basis of technical resources. Instead they should be considered as a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, iCloud organisation, Internet of Everything) and a large number of users dispersed geographically and producing an unimaginable number of applications. This new, interdisciplinary approach is developing a continually increasing range of methods which apply also the latest findings in artificial intelligence (AI) and computational intelligence (CI).SOMMARIO
Sequence mining and property verification for fault localization in Simulink models.- Handwritten text lines segmentation using two column projection.- Convolutional Neural Networks for Dot Counting in Fluorescence in Situ Hybridization Imaging.- Classification of Local Administrative Units in Poland: Spatial Approach.- Development of Methodology for Counteraction to Cyber-attacks in Wireless Sensor Networks.- The Need to Use a Hash Function to Build a Crypto Algorithm for Blockchain.- Common Criteria vulnerability assessment ontology.- Risk Management Approach for Revitalization of Post-Mining Areas.- CVE based classification of vulnerable IoT systems.- Reliability and Availability Analysis of Critical Infrastructure Composed of Dependent Systems.ALTRE INFORMAZIONI
- Condizione: Nuovo
- ISBN: 9783030482558
- Collana: Advances in Intelligent Systems and Computing
- Dimensioni: 235 x 155 mm
- Formato: Brossura
- Illustration Notes: XVIII, 713 p. 256 illus., 183 illus. in color.
- Pagine Arabe: 713
- Pagine Romane: xviii