![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MUSEPAT 2013, held in Saint Petersburg, Russia, in August 2013. The 9 revised papers were carefully reviewed and selected from 25 submissions. The accepted papers are organized into three main sessions and cover topics such as software engineering for multicore systems; specification, modeling and design; programing models, languages, compiler techniques and development tools; verification, testing, analysis, debugging and performance tuning, security testing; software maintenance and evolution; multicore software issues in scientific computing, embedded and mobile systems; energy-efficient computing as well as experience reports.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
The combination of VLSI process technology and real-time digital signal processing (DSP) has brought a break-through in information technology. This rapid technical (r)evolution allows the integration of ever more complex systems on a single chip. However, these technology and integration advances have not been matched by an increase in design productivity, causing technology to leapfrog the design of integrated circuits (ICs). The success of these emerging 'systems-on-a-chip' (SOC) can only be guaranteed by a systematic and formal design methodology, possibly automated in computer-aided design (CAD) tools, and effective re-use of existing intellectual property (IP). In this book, a contribution is made to the modeling, timing verification and analysis, and the automatic synthesis of integrated real-time DSP systems. Existing literature in these three domains is extensively reviewed, making this book the first to give a comprehensive overview of existing techniques.The emphasis throughout the book is on the support and guaranteeing of the real-time aspect and constraints of these systems, which avoids time consuming design iterations and safeguards the ever shrinking time-to-market. The proposed 'Multi-Thread Graph' (MTG) system model features two-layers, unifying a (timed) Petri net and a control-data flow graph. Its unique interface between both models offers the best of two worlds and introduces an extra abstraction level hiding the operation-level details which are unnecessary during global system exploration. The formulated timing analysis and verification approach supports the calculation of temporal separation between different MTG entities as well as realistic performance metrics for highly concurrent systems. The synthesis methodology focuses on managing the task-level concurrency (i.e. task scheduling), as part of a proposed overall system design meta flow. It emphasizes performance and timing aspects ('timeliness'), while minimizing processor cost overhead as driven by high-level cost estimators.The approach is new in the abstraction level it employs, and in its optimal hybrid dynamic/static scheduling policy which, driven by cost estimators, selects the scheduling policy for each behavior. At the low-level, RTOS synthesis generates an application-specific scheduler for the software component. The proposed synthesis methodology (at the task-level) is asserted to yield most optimal results when employed before the hardware/software partition is made. At this level, the distinction between these two is minimal, such that all steps in the design trajectory can be shared, thereby reducing the system cost significantly and allowing tighter satisfaction of timing/performance constraints. From the Foreword: This book is the first comprehensive treatment of software, and more general, system, generation (synthesis) techniques based on formal models. It can be used as a very valuable reference to understand the development of the field of embedded software design, and of system design and synthesis in general. The book offers an invaluable help to researchers and practitioners of the field of embedded system design. Prof. Alberto Sangiovanni-Vincentelli, Edgar L. and Harold H.Buttner Professor of Electrical Engineering and Computer Science, University of California, Berkeley, Chief Technology Advisor, Cadence Design Systems.
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of robotics for rehabilitation and assistance; mechatronics and integration technology in electronics and information devices fabrication; man-machine interactions; manufacturing; micro and nano systems; mobile robots and intelligent autonomous systems; motion control; multi-agent systems and distributed control; and multi-sensor data fusion algorithms.
Reliability, Maintainability, and Supportability play a crucial role in achieving a competitive product. While manufacturing costs are important for the success of a product, they are not the sole domains in realizing its competitive edge. Improved manufacturing and operating quality and performance coupled with reduced acquisition cost and in-service cost of ownership are important in achieving business success. It is the early phase of design which offers the greatest opportunity to address these requirements, and thus create life cycle effectiveness. The main objective of Reliability, Maintenance and Logistic Support - A Life Cycle Approach is to provide an integrated approach to reliability, maintainability, maintenance and logistic support analysis. We not only look at the ways we can improve the design process to ensure the product offers value for money, but we also consider how the owners can get the most from these products once they have entered service. The approach provides a meaningful way of integrating reliability, maintenance and supportability to enhance the product performance and sales opportunities. Hence, the book covers the following objectives: (1) Introduce the concepts of reliability, maintainability and supportability and their role in the system life cycle and effectiveness. (2) Introduce the basic probability and statistical techniques that are essential for modelling reliability, maintainability and supportability problems. (3) Introduce reliability measures: how to predict them; how to determine from in-service real-world data; how to use them. (4) Analysis of advanced models in Reliability. (5) Discuss basic and advanced concepts in both maintainability and maintenance including preventive, corrective and condition based maintenance. (6) Discuss maintenance management and optimization concepts, such as reliability-centered maintenance and age-related maintenance. (7) Provide basic concepts in supportability and Integrated logistic support. (8) Discuss techniques for design for reliability, maintainability and supportability. (9) Analysis of simple and advanced models in spares forecasting and optimization. (10) Discuss data analysis, data management and data mining techniques.
Operating Systems and Services brings together in one place important contributions and up-to-date research results in this fast moving area. Operating Systems and Services serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
Representations of humans in virtual environments are called Avatars. This book brings together work from a variety of relevant disciplines to detail how humans interact in computer-generated environments. It contains contributions from several key people in the field, including Microsoft Researchs Virtual World Group, and presents their findings in a way that is accessible to readers who are new to the field. Coverage details Internet-based virtual worlds that have been widely used by the public as well as networked VR systems that have been primarily used in pilot studies and research.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Programming Multi-Agents Systems held in Valencia, Spain, in June 2012. The 10 revised full papers presented were carefully selected from 14 submissions covering a wide range of topics in multi-agent system programming languages, including language design and efficient implementation, agent communication, and robot programming. I addition to these regular papers, the volume includes six papers from the Multi-Agent programming Contest 2012 (MAPC).
This book constitutes the thoroughly refereed proceedings of the 18th International Conference, Euro-Par 2012, held in Rhodes Islands, Greece, in August 2012. The 75 revised full papers presented were carefully reviewed and selected from 228 submissions. The papers are organized in topical sections on support tools and environments; performance prediction and evaluation; scheduling and load balancing; high-performance architectures and compilers; parallel and distributed data management; grid, cluster and cloud computing; peer to peer computing; distributed systems and algorithms; parallel and distributed programming; parallel numerical algorithms; multicore and manycore programming; theory and algorithms for parallel computation; high performance network and communication; mobile and ubiquitous computing; high performance and scientific applications; GPU and accelerators computing.
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2012, held in Magdeburg, Germany, in September 2012. The 33 revised full papers presented were carefully reviewed and selected from more than 70 submissions. The papers are organized in topical sections on tools, risk analysis, testing, quantitative analysis, security, formal methods, aeronautic, automotive, and process. Also included are 4 case studies.
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, pret a voter and trivitas, and experiences.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of robot actuators and sensors; robot design, development and control; robot intelligence, learning and linguistics; robot mechanism and design; robot motion analysis and planning; robotic vision, recognition and reconstruction; and planning and navigation.
This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Computer Music Modeling and Retrieval, CMMR 2011 and the 20th International Symposium on Frontiers of Research in Speech and Music, FRSM 2011. This year the 2 conferences merged for the first time and were held in Bhubanes, India, in March 2011. The 17 revised full papers presented were specially reviewed and revised for inclusion in this proceedings volume. The book is divided in four main chapters which reflect the high quality of the sessions of CMMR 2011, the collaboration with FRSM 2011 and the Indian influence, in the topics of Indian Music, Music Information Retrieval, Sound analysis synthesis and perception and Speech processing of Indian languages.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of adaptive control systems; automotive systems; estimation and identification; intelligent visual systems; application of differential geometry in robotic mechanisms; unmanned systems technologies and applications; new development on health management, fault diagnosis, and fault-tolerant control; biomechatronics; intelligent control of mechanical and mechatronic systems.
This book constitutes the refereed proceedings of the 18th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2013, was held in Berlin, Germany, in June 2013. The 11 full papers presented were carefully reviewed and selected from various submissions. They are organized in topical sections on multi-core and distributed systems; Ada and Spark; dependability; and real-time systems.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Sensor Systems and Software, S-Cube 2012, held in Lisbon, Portugal in June 2012. The 12 revised full papers presented were carefully reviewed and selected from over 18 submissions and four invited talks and cover a wide range of topics including middleware, frameworks, learning from sensor data streams, stock management, e-health, and Web Of Things.
This book constitutes the refereed proceedings of the 5th International Conference on Image and Signal Processing, ICISP 2012, held in Agadir, Morocco, in June 2012. The 75 revised full papers presented were carefully reviewed and selected from 158 submissions. The contributions are grouped into the following topical sections: multi/hyperspectral imaging; image itering and coding; signal processing; biometric; watermarking and texture; segmentation and retieval; image processing; pattern recognition.
This book constitutes the proceedings of the 17th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2012, held in Paris, France, in August 2012. The 14 papers presented were carefully reviewed and selected from 37 submissions. The aim of the FMICS workshop series is to provide a forum for researchers who are interested in the development and application of formal methods in industry. It also strives to promote research and development for the improvement of formal methods and tools for industrial applications.
Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and operating system level are presented. A primary concern at these levels is balancing cost and performance against coverage and overall dependability. As these chapters demonstrate, low overhead, practical solutions are attainable and not necessarily incompatible with performance considerations. The section on innovative compiler support, in particular, demonstrates how the benefits of application specificity may be obtained while reducing hardware cost and run-time overhead. A companion to this volume (published by Kluwer) subtitled Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and analysis methods necessary to design, validate and analyze dependable systems. Another companion to this book (published by Kluwer), subtitled Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book subtitled System Implementation, these approaches demonstrate how dependability may be tuned to the requirements of an application, the fault environment, and the characteristics of the target platform. Three classes of paradigms are considered: protocol-based paradigms for distributed applications, algorithm-based paradigms for parallel applications, and approaches to exploiting application semantics in embedded real-time control systems.
This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.
I3E 2009 was held in Nancy, France, during September 23-25, hosted by Nancy University and INRIA Grand-Est at LORIA. The conference provided scientists andpractitionersofacademia, industryandgovernmentwithaforumwherethey presented their latest ?ndings concerning application of e-business, e-services and e-society, and the underlying technology to support these applications. The 9th IFIP Conference on e-Business, e-Services and e-Society, sponsored by IFIP WG 6.1. of Technical Committees TC6 in cooperation with TC11, and TC8 represents the continuation of previous events held in Zurich (Switzerland) in 2001, Lisbon (Portugal) in 2002, Sao Paulo (Brazil) in 2003, Toulouse (France) in 2004, Poznan (Poland) in 2005, Turku (Finland) in 2006, Wuhan (China) in 2007 and Tokyo (Japan) in 2008. The call for papers attracted papers from 31 countries from the ?ve con- nents. As a result, the I3E 2009 programo?ered 12 sessions of full-paper pres- tations. The 31 selected papers cover a wide and important variety of issues in e-Business, e-servicesande-society, including security, trust, andprivacy, ethical and societal issues, business organization, provision of services as software and software as services, and others. Extended versions of selected papers submitted to I3E 2009 will be published in the International Journal of e-Adoption and in AIS Transactions on Enterprise Systems. In addition, a 500-euros prize was awarded to the authors of the best paper selected by the Program Comm- tee. We thank all authors who submitted their papers, the Program Committee members and external reviewers for their excellent
This book constitutes the refereed proceedings of the International Conference on Multiscore Software Engineering, Performance, and Tools, MSEPT 2012, held in Prague in May/June 2012. The 9 revised papers, 4 of which are short papers were carefully reviewed and selected from 24 submissions. The papers address new work on optimization of multicore software, program analysis, and automatic parallelization. They also provide new perspectives on programming models as well as on applications of multicore systems.
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and analysis methods necessary to design, validate and analyze dependable systems. A companion to this book (published by Kluwer), subtitled Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book subtitled System Implementation, these approaches demonstrate how dependability may be tuned to the requirements of an application, the fault environment, and the characteristics of the target platform. Three classes of paradigms are considered: protocol-based paradigms for distributed applications, algorithm-based paradigms for parallel applications, and approaches to exploiting application semantics in embedded real-time control systems. Another companion book (published by Kluwer) subtitled System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and operating system level are presented. A primary concern at these levels is balancing cost and performance against coverage and overall dependability. As these chapters demonstrate, low overhead, practical solutions are attainable and not necessarily incompatible with performance considerations. The section on innovative compiler support, in particular, demonstrates how the benefits of application specificity may be obtained while reducing hardware cost and run-time overhead.
On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits. |
![]() ![]() You may like...
Morphology and Syntax - Tools for…
John Albert Bickford, J. Albert Bickford
Hardcover
Track-Before-Detect Using Expectation…
Samuel J. Davey, Han X. Gaetjens
Hardcover
R3,204
Discovery Miles 32 040
Proceedings of International Scientific…
Nikita Voinov, Tobias Schreck, …
Hardcover
R7,650
Discovery Miles 76 500
Higher Education 4.0 - The Digital…
Kevin Anthony Jones, Sharma Ravishankar
Hardcover
R4,590
Discovery Miles 45 900
|