0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002):... Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R2,934 Discovery Miles 29 340 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.

Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jeffrey J.P. Tsai, Philip S. Yu
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.): Eric Y.T. Juan, Jeffrey J.P. Tsai Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences."

Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,397 Discovery Miles 23 970 Ships in 10 - 15 working days

With the increasing availability of omics data and mounting evidence of the usefulness of computational approaches to tackle multi-level data problems in bioinformatics and biomedical research in this post-genomics era, computational biology has been playing an increasingly important role in paving the way as basis for patient-centric healthcare.Two such areas are: (i) implementing AI algorithms supported by biomedical data would deliver significant benefits/improvements towards the goals of precision medicine (ii) blockchain technology will enable medical doctors to securely and privately build personal healthcare records, and identify the right therapeutic treatments and predict the progression of the diseases.A follow-up in the publication of our book Computation Methods with Applications in Bioinformatics Analysis (2017), topics in this volume include: clinical bioinformatics, omics-based data analysis, Artificial Intelligence (AI), blockchain, big data analytics, drug discovery, RNA-seq analysis, tensor decomposition and Boolean network.

Computational Methods With Applications In Bioinformatics Analysis (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Computational Methods With Applications In Bioinformatics Analysis (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,634 Discovery Miles 26 340 Ships in 10 - 15 working days

This compendium contains 10 chapters written by world renowned researchers with expertise in semantic computing, genome sequence analysis, biomolecular interaction, time-series microarray analysis, and machine learning algorithms.The salient feature of this book is that it highlights eight types of computational techniques to tackle different biomedical applications. These techniques include unsupervised learning algorithms, principal component analysis, fuzzy integral, graph-based ensemble clustering method, semantic analysis, interolog approach, molecular simulations and enzyme kinetics.The unique volume will be a useful reference material and an inspirational read for advanced undergraduate and graduate students, computer scientists, computational biologists, bioinformatics and biomedical professionals.

Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.): Jeffrey J.P. Tsai, Zhenwei Yu Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.)
Jeffrey J.P. Tsai, Zhenwei Yu
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

This important textbook introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Haus Republik Ceramic Gradient Double…
R899 Discovery Miles 8 990
Large 1680D Boys & Girls Backpack…
R507 Discovery Miles 5 070
HP 250 G9 15.6" Celeron Notebook…
R5,700 R5,400 Discovery Miles 54 000
Samurai Sword Murder - The Morne Harmse…
Nicole Engelbrecht Paperback R330 R284 Discovery Miles 2 840
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,399 Discovery Miles 23 990
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger Blu-ray disc  (1)
R79 Discovery Miles 790
The Expendables 2
Sylvester Stallone, Jason Statham, … Blu-ray disc  (1)
R64 Discovery Miles 640
Bostik Glu Dots - Removable (64 Dots)
 (3)
R55 Discovery Miles 550
Cable Guys Controller and Smartphone…
R408 Discovery Miles 4 080
Bostik Clear on Blister Card (25ml)
R38 Discovery Miles 380

 

Partners