0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002):... Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R2,934 Discovery Miles 29 340 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.

Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jeffrey J.P. Tsai, Philip S. Yu
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.): Eric Y.T. Juan, Jeffrey J.P. Tsai Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences."

Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,397 Discovery Miles 23 970 Ships in 10 - 15 working days

With the increasing availability of omics data and mounting evidence of the usefulness of computational approaches to tackle multi-level data problems in bioinformatics and biomedical research in this post-genomics era, computational biology has been playing an increasingly important role in paving the way as basis for patient-centric healthcare.Two such areas are: (i) implementing AI algorithms supported by biomedical data would deliver significant benefits/improvements towards the goals of precision medicine (ii) blockchain technology will enable medical doctors to securely and privately build personal healthcare records, and identify the right therapeutic treatments and predict the progression of the diseases.A follow-up in the publication of our book Computation Methods with Applications in Bioinformatics Analysis (2017), topics in this volume include: clinical bioinformatics, omics-based data analysis, Artificial Intelligence (AI), blockchain, big data analytics, drug discovery, RNA-seq analysis, tensor decomposition and Boolean network.

Computational Methods With Applications In Bioinformatics Analysis (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Computational Methods With Applications In Bioinformatics Analysis (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,634 Discovery Miles 26 340 Ships in 10 - 15 working days

This compendium contains 10 chapters written by world renowned researchers with expertise in semantic computing, genome sequence analysis, biomolecular interaction, time-series microarray analysis, and machine learning algorithms.The salient feature of this book is that it highlights eight types of computational techniques to tackle different biomedical applications. These techniques include unsupervised learning algorithms, principal component analysis, fuzzy integral, graph-based ensemble clustering method, semantic analysis, interolog approach, molecular simulations and enzyme kinetics.The unique volume will be a useful reference material and an inspirational read for advanced undergraduate and graduate students, computer scientists, computational biologists, bioinformatics and biomedical professionals.

Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.): Jeffrey J.P. Tsai, Zhenwei Yu Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.)
Jeffrey J.P. Tsai, Zhenwei Yu
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

This important textbook introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hydrodynamic and Magnetohydrodynamic…
A. Yoshizawa Paperback R7,334 Discovery Miles 73 340
Jamming and Rheology - Constrained…
Andrea J. Liu, Sidney R. Nagel Paperback R1,519 Discovery Miles 15 190
Statistical Treatment of Turbulent…
J.S. Shrimpton, S. Haeri, … Hardcover R2,164 Discovery Miles 21 640
Air Pollution and Turbulence - Modeling…
Davidson Moreira, Marco Vilhena Hardcover R4,611 Discovery Miles 46 110
Mathematical Foundation of Turbulent…
Marco Cannone Paperback R1,938 Discovery Miles 19 380
Hydromechanical Aspects and Unsaturated…
B. Indraratna, P.G. Ranjith Paperback R1,834 R703 Discovery Miles 7 030
Dynamics of Multiphase Flows
Chao Zhu, Liang-Shih Fan, … Hardcover R2,878 Discovery Miles 28 780
Flow Control - Passive, Active, and…
Mohamed Gad-el-Hak Hardcover R4,011 Discovery Miles 40 110
Partial Differential Equations in Fluid…
Charles L. Fefferman, James C. Robinson, … Paperback R2,189 Discovery Miles 21 890
The Structure of Turbulent Shear Flow
A. A. R. Townsend Paperback R2,434 Discovery Miles 24 340

 

Partners