libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

zamojski wojciech (curatore); mazurkiewicz jacek (curatore); sugier jaroslaw (curatore); walkowiak tomasz (curatore); kacprzyk janusz (curatore) - theory and applications of dependable computer systems

Theory and Applications of Dependable Computer Systems Proceedings of the Fifteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 29 – July 3, 2020, Brunów, Poland

; ; ; ;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
162,98 €
NICEPRICE
154,83 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 05/2020
Edizione: 1st ed. 2020





Trama

This book presents selected papers from the Fifteenth International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX), which illustrate the diversity of theoretical problems in analysis of performability, reliability and security of contemporary computer systems. Covering also methodologies and practical tools involved in this field, it is a valuable reference resource for scientists, researchers, practitioners and students who are dealing with these subjects.

Established in 2006, DepCoS-RELCOMEX is an annual conference series organised by Wroclaw University of Science and Technology. It focuses on the dependability and performability of contemporary computer systems – topics that can provide solutions to new challenges in evaluation of their reliability and efficiency. Since they are probably the most complex technical systems ever engineered by humans, the organization of modern computer systems cannot be modelled and analysed solelyas structures (however complex and distributed) built only on the basis of technical resources. Instead they should be considered as a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, iCloud organisation, Internet of Everything) and a large number of users dispersed geographically and producing an unimaginable number of applications. This new, interdisciplinary approach is developing a continually increasing range of methods which apply also the latest findings in artificial intelligence (AI) and computational intelligence (CI).





Sommario

Sequence mining and property verification for fault localization in Simulink models.- Handwritten text lines segmentation using two column projection.- Convolutional Neural Networks for Dot Counting in Fluorescence in Situ Hybridization Imaging.- Classification of Local Administrative Units in Poland: Spatial Approach.- Development of Methodology for Counteraction to Cyber-attacks in Wireless Sensor Networks.- The Need to Use a Hash Function to Build a Crypto Algorithm for Blockchain.- Common Criteria vulnerability assessment ontology.- Risk Management Approach for Revitalization of Post-Mining Areas.- CVE based classification of vulnerable IoT systems.- Reliability and Availability Analysis of Critical Infrastructure Composed of Dependent Systems.










Altre Informazioni

ISBN:

9783030482558

Condizione: Nuovo
Collana: Advances in Intelligent Systems and Computing
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XVIII, 713 p. 256 illus., 183 illus. in color.
Pagine Arabe: 713
Pagine Romane: xviii


Dicono di noi