|
|
Showing 1 - 21 of
21 matches in All Departments
This book provides an overview about the open challenges in
software verification. Software verification is a branch of
software engineering aiming at guaranteeing that software
applications satisfy some requirements of interest. Over the years,
the software verification community has proposed and considered
several techniques: abstract interpretation, data-flow analysis,
type systems, model checking are just a few examples. The
theoretical advances have been always motivated by practical
challenges that have led to an equal evolution of both these sides
of software verification. Indeed, several verification tools have
been proposed by the research community and any software
application, in order to guarantee that certain software
requirements are met, needs to integrate a verification phase in
its life cycle, independently of the context of application or
software size. This book is aimed at collecting contributions
discussing recent advances in facing open challenges in software
verification, relying on a broad spectrum of verification
techniques. This book collects contributions ranging from
theoretical to practical arguments, and it is aimed at both
researchers in software verification and their practitioners.
This book features extended versions of selected papers that were
presented and discussed at the 6th International Doctoral Symposium
on Applied Computation and Security Systems (ACSS 2019) held in
Kolkata, India on 12-13 March, 2019. Organized by the Departments
of Computer Science & Engineering and A.K. Choudhury School of
Information Technology, both from the University of Calcutta, the
symposium's international partners were Ca' Foscari University of
Venice, Italy and Bialystok University of Technology, Poland. The
chapters cover topics such as biometrics, image processing, pattern
recognition, algorithms, cloud computing, wireless sensor networks
and security systems, reflecting the various symposium sessions.
The book includes extended versions of selected papers discussed
and presented at the 5th International Doctoral Symposium on
Applied Computation and Security Systems (ACSS 2018) held in
Kolkata, India on February 9-11, 2018. The symposium was organized
by the University of Calcutta's Department of Computer Science
& Engineering and A. K. Choudhury School of Information
Technology, and the International partners were Ca Foscari
University of Venice, Italy and Bialystok University of Technology,
Poland. Reflect the symposium's sessions, the book discusses topics
such as biometrics, image processing, pattern recognition,
algorithms, cloud computing, wireless sensor networks and security
systems.
The book includes extended versions of selected papers discussed
and presented at the 5th International Doctoral Symposium on
Applied Computation and Security Systems (ACSS 2018) held in
Kolkata, India on February 9-11, 2018. The symposium was organized
by the University of Calcutta's Department of Computer Science
& Engineering and A. K. Choudhury School of Information
Technology, and the International partners were Ca Foscari
University of Venice, Italy and Bialystok University of Technology,
Poland. Reflect the symposium's sessions, the book discusses topics
such as biometrics, image processing, pattern recognition,
algorithms, cloud computing, wireless sensor networks and security
systems.
This book features extended versions of selected papers that were
presented and discussed at the 6th International Doctoral Symposium
on Applied Computation and Security Systems (ACSS 2019) held in
Kolkata, India on 12-13 March, 2019. Organized by the Departments
of Computer Science & Engineering and A. K. Choudhury School of
Information Technology, both from the University of Calcutta, the
symposium's international partners were Ca' Foscari University of
Venice, Italy and Bialystok University of Technology, Poland. The
chapters cover topics such as biometrics, image processing, pattern
recognition, algorithms, cloud computing, wireless sensor networks
and security systems, reflecting the various symposium sessions.
This book contains extended version of selected works that have
been discussed and presented in the fourth International Doctoral
Symposium on Applied Computation and Security Systems (ACSS 2017)
held in Patna, India during March 17-19, 2017. The symposium was
organized by the Departments of Computer Science & Engineering
and A. K. Choudhury School of Information Technology, both from
University of Calcutta in collaboration with NIT, Patna. The
International partners for ACSS 2016 had been Ca Foscari University
of Venice, Italy and Bialystok University of Technology, Poland.
This bi-volume book has a total of 21 papers divided in 7 chapters.
The chapters reflect the sessions in which the works have been
discussed during the symposium. The different chapters in the book
include works on biometrics, image processing, pattern recognition,
algorithms, cloud computing, wireless sensor networks and security
systems.
This book contains extended version of selected works that have
been discussed and presented in the fourth International Doctoral
Symposium on Applied Computation and Security Systems (ACSS 2017)
held in Patna, India during March 17-19, 2017. The symposium was
organized by the Departments of Computer Science & Engineering
and A. K. Choudhury School of Information Technology, both from
University of Calcutta in collaboration with NIT, Patna. The
International partners for ACSS 2016 had been Ca Foscari University
of Venice, Italy and Bialystok University of Technology, Poland.
This bi-volume book has a total of 21 papers divided in 7 chapters.
The chapters reflect the sessions in which the works have been
discussed during the symposium. The different chapters in the book
include works on biometrics, image processing, pattern recognition,
algorithms, cloud computing, wireless sensor networks and security
systems.
The book presents high quality research work in cutting edge
technologies and most-happening areas of computational intelligence
and data engineering. It contains selected papers presented at
International Conference on Computational Intelligence and Data
Engineering (ICCIDE 2017). The conference was conceived as a forum
for presenting and exchanging ideas and results of the researchers
from academia and industry onto a common platform and help them
develop a comprehensive understanding of the challenges of
technological advancements from different viewpoints. This book
will help in fostering a healthy and vibrant relationship between
academia and industry. The topics of the conference include, but
are not limited to collective intelligence, intelligent
transportation systems, fuzzy systems, Bayesian network, ant colony
optimization, data privacy and security, data mining, data
warehousing, big data analytics, cloud computing, natural language
processing, swarm intelligence, and speech processing.
This book presents extended versions of papers originally presented
and discussed at the 3rd International Doctoral Symposium on
Applied Computation and Security Systems (ACSS 2016) held from
August 12 to 14, 2016 in Kolkata, India. The symposium was jointly
organized by the AGH University of Science & Technology,
Cracow, Poland; Ca' Foscari University, Venice, Italy; and the
University of Calcutta, India. The book is divided into two
volumes, Volumes 3 and 4, and presents dissertation works in the
areas of Image Processing, Biometrics-based Authentication, Soft
Computing, Data Mining, Next-Generation Networking and Network
Security, Remote Healthcare, Communications, Embedded Systems,
Software Engineering and Service Engineering. The first two volumes
of the book published the works presented at the ACSS 2015, which
was held from May 23 to 25, 2015 in Kolkata, India.
This book presents extended versions of papers originally presented
and discussed at the 3rd International Doctoral Symposium on
Applied Computation and Security Systems (ACSS 2016) held from
August 12 to 14, 2016 in Kolkata, India. The symposium was jointly
organized by the AGH University of Science & Technology,
Cracow, Poland; Ca' Foscari University, Venice, Italy; and the
University of Calcutta, India. The book is divided into two
volumes, Volumes 3 and 4, and presents dissertation works in the
areas of Image Processing, Biometrics-based Authentication, Soft
Computing, Data Mining, Next-Generation Networking and Network
Security, Remote Healthcare, Communications, Embedded Systems,
Software Engineering and Service Engineering. The first two volumes
of the book published the works presented at the ACSS 2015, which
was held from May 23 to 25, 2015 in Kolkata, India.
The book contains the extended version of the works that have been
presented and discussed in the Second International Doctoral
Symposium on Applied Computation and Security Systems (ACSS 2015)
held during May 23-25, 2015 in Kolkata, India. The symposium has
been jointly organized by the AGH University of Science &
Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy
and University of Calcutta, India. The book is divided into volumes
and presents dissertation works in the areas of Image Processing,
Biometrics-based Authentication, Soft Computing, Data Mining, Next
Generation Networking and Network Security, Remote Healthcare,
Communications, Embedded Systems, Software Engineering and Service
Engineering.
This book presents Hyper-lattice, a new algebraic model for
partially ordered sets, and an alternative to lattice. The authors
analyze some of the shortcomings of conventional lattice structure
and propose a novel algebraic structure in the form of
Hyper-lattice to overcome problems with lattice. They establish how
Hyper-lattice supports dynamic insertion of elements in a partial
order set with a partial hierarchy between the set members. The
authors present the characteristics and the different properties,
showing how propositions and lemmas formalize Hyper-lattice as a
new algebraic structure.
|
Computer Information Systems and Industrial Management - 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013, Proceedings (Paperback, 2013 ed.)
Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Slawomir Wierzchon
|
R1,475
Discovery Miles 14 750
|
Ships in 18 - 22 working days
|
This book constitutes the proceedings of the 12th IFIP TC 8
International Conference, CISIM 2013, held in Cracow, Poland, in
September 2013. The 44 papers presented in this volume were
carefully reviewed and selected from over 60 submissions. They are
organized in topical sections on biometric and biomedical
applications; pattern recognition and image processing; various
aspects of computer security, networking, algorithms, and
industrial applications. The book also contains full papers of a
keynote speech and the invited talk.
|
Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012, Proceedings (Paperback, 2012 ed.)
Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Slawomir Wierzchon
|
R1,451
Discovery Miles 14 510
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 11th
International Conference on Computer Information Systems and
Industrial Management, CISIM 2012, held in Venice, Italy, in
September 2012. The 35 revised full papers presented together with
2 keynote talks were carefully reviewed and selected from 80
submissions. The papers are organized in topical sections on
security, access control and intrusion detection; pattern
recognition and image processing; biometric applications;
algorithms and data management; networking; and system models and
risk assessment.
This book constitutes the refereed proceedings of the 10th
International Conference on Computer Information Systems, CISIM
2011, held in Kolkata, India, in December 2011. The 30 revised full
papers presented together with 6 keynote tasks and plenary lectures
were carefully reviewed and selected from 67 submissions. The
papers are organized in topical sections on networking and its
applications; agent-based systems; biometric applications; pattern
recognition and image processing; industrial applications;
algorithmic applications and data management; information and
network security.
|
Verification, Model Checking, and Abstract Interpretation - 4th International Conference, VMCAI 2003, New York, NY, USA, January 9-11, 2003, Proceedings (Paperback, 2003 ed.)
Lenore D. Zuck, Paul D. Attie, Agostino Cortesi, Supratik Mukhopadhyay
|
R1,519
Discovery Miles 15 190
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2003, held in New York, NY, USA in January 2003. The 20 revised full papers presented together with five invited contributions were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on static analysis, dynamic systems, abstract interpretation, model checking, security protocols, and formal methods.
|
Verification, Model Checking, and Abstract Interpretation - Third International Workshop, VMCAI 2002, Venice, Italy, January 21-22, 2002, Revised Papers (Paperback, 2002 ed.)
Agostino Cortesi
|
R1,521
Discovery Miles 15 210
|
Ships in 18 - 22 working days
|
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Verification, Model Checking, and Abstract Interpretation, VMCAI 2002, held in Venice, Italy in January 2002.The 22 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on security and protocols, timed systems and games, static analysis, optimization, types and verification, and temporal logics and systems.
Static analysis is increasingly recognized as a fundamental
reasearch area aimed at studying and developing tools for high
performance implementations and v- i cation systems for all
programming language paradigms. The last two decades have witnessed
substantial developments in this eld, ranging from theoretical
frameworks to design, implementation, and application of analyzers
in optim- ing compilers. Since 1994, SAS has been the annual
conference and forum for researchers in all aspects of static
analysis. This volume contains the proceedings of the 6th
International Symposium on Static Analysis (SAS'99) which was held
in Venice, Italy, on 22{24 September 1999. The previous SAS
conferences were held in Namur (Belgium), Glasgow (UK), Aachen
(Germany), Paris (France), and Pisa (Italy). The program committee
selected 18 papers out of 42 submissions on the basis of at least
three reviews. The resulting volume o ers to the reader a complete
landscape of the research in this area. The papers contribute to
the following topics: foundations of static analysis, abstract
domain design, and applications of static analysis to di erent
programming paradigms (concurrent, synchronous, imperative, object
oriented, logical, and functional). In particular, several papers
use static analysis for obtaining state space reduction in
concurrent systems. New application elds are also addressed, such
as the problems of security and secrecy.
This book features extended versions of selected papers that were
presented and discussed at the 7th International Doctoral Symposium
on Applied Computation and Security Systems (ACSS 2020) held in
Kolkata, India on February 28-29, 2020. Organized by the
Departments of Computer Science & Engineering and A. K.
Choudhury School of Information Technology, both from the
University of Calcutta, the symposium's international partners were
Ca Foscari University of Venice, Italy and Bialystok University of
Technology, Poland. The chapters cover topics such as biometrics,
image processing, pattern recognition, algorithms, cloud computing,
wireless sensor networks and security systems, reflecting the
various symposium sessions.
The book contains the extended version of the works that have been
presented and discussed in the Second International Doctoral
Symposium on Applied Computation and Security Systems (ACSS 2015)
held during May 23-25, 2015 in Kolkata, India. The symposium has
been jointly organized by the AGH University of Science &
Technology, Cracow, Poland; Ca' Foscari University, Venice, Italy
and University of Calcutta, India. The book is divided into volumes
and presents dissertation works in the areas of Image Processing,
Biometrics-based Authentication, Soft Computing, Data Mining, Next
Generation Networking and Network Security, Remote Healthcare,
Communications, Embedded Systems, Software Engineering and Service
Engineering.
This book covers various topics, including collective intelligence,
intelligent transportation systems, fuzzy systems, Bayesian
network, ant colony optimization, data privacy and security, data
mining, data warehousing, big data analytics, cloud computing,
natural language processing, swarm intelligence, and speech
processing. This book is a collection of high-quality research work
on cutting-edge technologies and the most-happening areas of
computational intelligence and data engineering. It includes
selected papers from the International Conference on Computational
Intelligence and Data Engineering (ICCIDE 2021).
|
You may like...
The Texas Murders
James Patterson, Andrew Bourelle
Paperback
R370
R330
Discovery Miles 3 300
Logo Modernism
Jens Muller, R.Roger Remington
Hardcover
R2,292
R1,850
Discovery Miles 18 500
|