0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.): Eric Y.T. Juan, Jeffrey J.P. Tsai Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R2,912 Discovery Miles 29 120 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences."

Computational Methods With Applications In Bioinformatics Analysis (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Computational Methods With Applications In Bioinformatics Analysis (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,484 Discovery Miles 24 840 Ships in 10 - 15 working days

This compendium contains 10 chapters written by world renowned researchers with expertise in semantic computing, genome sequence analysis, biomolecular interaction, time-series microarray analysis, and machine learning algorithms.The salient feature of this book is that it highlights eight types of computational techniques to tackle different biomedical applications. These techniques include unsupervised learning algorithms, principal component analysis, fuzzy integral, graph-based ensemble clustering method, semantic analysis, interolog approach, molecular simulations and enzyme kinetics.The unique volume will be a useful reference material and an inspirational read for advanced undergraduate and graduate students, computer scientists, computational biologists, bioinformatics and biomedical professionals.

Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.): Jeffrey J.P. Tsai, Zhenwei Yu Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.)
Jeffrey J.P. Tsai, Zhenwei Yu
R2,645 Discovery Miles 26 450 Ships in 12 - 17 working days

This important textbook introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.

Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002):... Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R2,767 Discovery Miles 27 670 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.

Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jeffrey J.P. Tsai, Philip S. Yu
R4,229 Discovery Miles 42 290 Ships in 10 - 15 working days

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,261 Discovery Miles 22 610 Ships in 10 - 15 working days

With the increasing availability of omics data and mounting evidence of the usefulness of computational approaches to tackle multi-level data problems in bioinformatics and biomedical research in this post-genomics era, computational biology has been playing an increasingly important role in paving the way as basis for patient-centric healthcare.Two such areas are: (i) implementing AI algorithms supported by biomedical data would deliver significant benefits/improvements towards the goals of precision medicine (ii) blockchain technology will enable medical doctors to securely and privately build personal healthcare records, and identify the right therapeutic treatments and predict the progression of the diseases.A follow-up in the publication of our book Computation Methods with Applications in Bioinformatics Analysis (2017), topics in this volume include: clinical bioinformatics, omics-based data analysis, Artificial Intelligence (AI), blockchain, big data analytics, drug discovery, RNA-seq analysis, tensor decomposition and Boolean network.

Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Hardcover, 2009 ed.): Jeffrey J.P. Tsai, Philip S. Yu Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Hardcover, 2009 ed.)
Jeffrey J.P. Tsai, Philip S. Yu
R3,997 R3,754 Discovery Miles 37 540 Save R243 (6%) Ships in 12 - 17 working days

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Peptine Pro Equine Hydrolysed Collagen…
R699 R499 Discovery Miles 4 990
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
Fly Repellent ShooAway (White)(2 Pack)
R698 R578 Discovery Miles 5 780
Ultimate Cookies & Cupcakes For Kids
Hinkler Pty Ltd Kit R299 R234 Discovery Miles 2 340
Linx La Work Desk (Walnut)
R4,499 Discovery Miles 44 990
White Glo Eco-Friendly Bio Degradeable…
R70 Discovery Miles 700
Ticket To Paradise
George Clooney, Julia Roberts, … DVD  (1)
R113 Discovery Miles 1 130
Sing 2
Blu-ray disc R210 Discovery Miles 2 100
1 Litre Unicorn Waterbottle
R70 Discovery Miles 700
Fly Repellent ShooAway (White)(4 Pack)
R1,396 R1,076 Discovery Miles 10 760

 

Partners