0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (5)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002):... Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R2,934 Discovery Miles 29 340 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.

Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jeffrey J.P. Tsai, Philip S. Yu
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.): Eric Y.T. Juan, Jeffrey J.P. Tsai Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences."

Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,397 Discovery Miles 23 970 Ships in 10 - 15 working days

With the increasing availability of omics data and mounting evidence of the usefulness of computational approaches to tackle multi-level data problems in bioinformatics and biomedical research in this post-genomics era, computational biology has been playing an increasingly important role in paving the way as basis for patient-centric healthcare.Two such areas are: (i) implementing AI algorithms supported by biomedical data would deliver significant benefits/improvements towards the goals of precision medicine (ii) blockchain technology will enable medical doctors to securely and privately build personal healthcare records, and identify the right therapeutic treatments and predict the progression of the diseases.A follow-up in the publication of our book Computation Methods with Applications in Bioinformatics Analysis (2017), topics in this volume include: clinical bioinformatics, omics-based data analysis, Artificial Intelligence (AI), blockchain, big data analytics, drug discovery, RNA-seq analysis, tensor decomposition and Boolean network.

Computational Methods With Applications In Bioinformatics Analysis (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Computational Methods With Applications In Bioinformatics Analysis (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,634 Discovery Miles 26 340 Ships in 10 - 15 working days

This compendium contains 10 chapters written by world renowned researchers with expertise in semantic computing, genome sequence analysis, biomolecular interaction, time-series microarray analysis, and machine learning algorithms.The salient feature of this book is that it highlights eight types of computational techniques to tackle different biomedical applications. These techniques include unsupervised learning algorithms, principal component analysis, fuzzy integral, graph-based ensemble clustering method, semantic analysis, interolog approach, molecular simulations and enzyme kinetics.The unique volume will be a useful reference material and an inspirational read for advanced undergraduate and graduate students, computer scientists, computational biologists, bioinformatics and biomedical professionals.

Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.): Jeffrey J.P. Tsai, Zhenwei Yu Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.)
Jeffrey J.P. Tsai, Zhenwei Yu
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

This important textbook introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.

Machine Learning Applications In Software Engineering (Hardcover): Du Zhang, Jeffrey J.P. Tsai Machine Learning Applications In Software Engineering (Hardcover)
Du Zhang, Jeffrey J.P. Tsai
R5,024 Discovery Miles 50 240 Ships in 12 - 17 working days

Machine learning deals with the issue of how to build computer programs that improve their performance at some tasks through experience. Machine learning algorithms have proven to be of great practical value in a variety of application domains. Not surprisingly, the field of software engineering turns out to be a fertile ground where many software development and maintenance tasks could be formulated as learning problems and approached in terms of learning algorithms. This book deals with the subject of machine learning applications in software engineering. It provides an overview of machine learning, summarizes the state-of-the-practice in this niche area, gives a classification of the existing work, and offers some application guidelines. Also included in the book is a collection of previously published papers in this research area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Addis Window Squeegee Long Handle
R179 R149 Discovery Miles 1 490
Bosch GBM 320 Professional Drill…
R725 R589 Discovery Miles 5 890
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Pure Pleasure Non-Fitted Electric…
 (16)
R289 Discovery Miles 2 890
Amos Red Glue Stick (8g)
R10 Discovery Miles 100
Butterfly A4 160gsm Board Pad - Designer…
R70 Discovery Miles 700
Efekto Karbadust Insecticide Dusting…
R54 Discovery Miles 540
Elecstor 18W In-Line UPS (Black)
R999 R869 Discovery Miles 8 690
Batman v Superman - Dawn Of Justice…
Ben Affleck, Henry Cavill, … Blu-ray disc  (3)
R549 Discovery Miles 5 490
Pamper Fine Cuts in Jelly - Lamb and…
R12 R9 Discovery Miles 90

 

Partners