0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002):... Compositional Verification of Concurrent and Real-Time Systems (Paperback, Softcover reprint of the original 1st ed. 2002)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R2,934 Discovery Miles 29 340 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences.

Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009):... Machine Learning in Cyber Trust - Security, Privacy, and Reliability (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jeffrey J.P. Tsai, Philip S. Yu
R4,487 Discovery Miles 44 870 Ships in 10 - 15 working days

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.): Eric Y.T. Juan, Jeffrey J.P. Tsai Compositional Verification of Concurrent and Real-Time Systems (Hardcover, 2002 ed.)
Eric Y.T. Juan, Jeffrey J.P. Tsai
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

With the rapid growth of networking and high-computing power, the demand for large-scale and complex software systems has increased dramatically. Many of the software systems support or supplant human control of safety-critical systems such as flight control systems, space shuttle control systems, aircraft avionics control systems, robotics, patient monitoring systems, nuclear power plant control systems, and so on. Failure of safety-critical systems could result in great disasters and loss of human life. Therefore, software used for safety critical systems should preserve high assurance properties. In order to comply with high assurance properties, a safety-critical system often shares resources between multiple concurrently active computing agents and must meet rigid real-time constraints. However, concurrency and timing constraints make the development of a safety-critical system much more error prone and arduous. The correctness of software systems nowadays depends mainly on the work of testing and debugging. Testing and debugging involve the process of de tecting, locating, analyzing, isolating, and correcting suspected faults using the runtime information of a system. However, testing and debugging are not sufficient to prove the correctness of a safety-critical system. In contrast, static analysis is supported by formalisms to specify the system precisely. Formal verification methods are then applied to prove the logical correctness of the system with respect to the specification. Formal verifica tion gives us greater confidence that safety-critical systems meet the desired assurance properties in order to avoid disastrous consequences."

Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Application Of Omics, Ai And Blockchain In Bioinformatics Research (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,397 Discovery Miles 23 970 Ships in 10 - 15 working days

With the increasing availability of omics data and mounting evidence of the usefulness of computational approaches to tackle multi-level data problems in bioinformatics and biomedical research in this post-genomics era, computational biology has been playing an increasingly important role in paving the way as basis for patient-centric healthcare.Two such areas are: (i) implementing AI algorithms supported by biomedical data would deliver significant benefits/improvements towards the goals of precision medicine (ii) blockchain technology will enable medical doctors to securely and privately build personal healthcare records, and identify the right therapeutic treatments and predict the progression of the diseases.A follow-up in the publication of our book Computation Methods with Applications in Bioinformatics Analysis (2017), topics in this volume include: clinical bioinformatics, omics-based data analysis, Artificial Intelligence (AI), blockchain, big data analytics, drug discovery, RNA-seq analysis, tensor decomposition and Boolean network.

Computational Methods With Applications In Bioinformatics Analysis (Hardcover): Jeffrey J.P. Tsai, Ka-Lok Ng Computational Methods With Applications In Bioinformatics Analysis (Hardcover)
Jeffrey J.P. Tsai, Ka-Lok Ng
R2,634 Discovery Miles 26 340 Ships in 10 - 15 working days

This compendium contains 10 chapters written by world renowned researchers with expertise in semantic computing, genome sequence analysis, biomolecular interaction, time-series microarray analysis, and machine learning algorithms.The salient feature of this book is that it highlights eight types of computational techniques to tackle different biomedical applications. These techniques include unsupervised learning algorithms, principal component analysis, fuzzy integral, graph-based ensemble clustering method, semantic analysis, interolog approach, molecular simulations and enzyme kinetics.The unique volume will be a useful reference material and an inspirational read for advanced undergraduate and graduate students, computer scientists, computational biologists, bioinformatics and biomedical professionals.

Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.): Jeffrey J.P. Tsai, Zhenwei Yu Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.)
Jeffrey J.P. Tsai, Zhenwei Yu
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

This important textbook introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
This Will Not Pass - Trump, Biden, And…
Jonathan Martin, Alexander Burns Hardcover R844 R706 Discovery Miles 7 060
Vox Populi - Populism as a Rhetorical…
Ingeborg van der Geest, Henrike Jansen, … Hardcover R3,357 Discovery Miles 33 570
Demopathy and the Democratic Malaise…
Luigi Di Gregorio Hardcover R2,905 Discovery Miles 29 050
Landslide - The Final Days Of The Trump…
Michael Wolff Paperback R480 R395 Discovery Miles 3 950
How Social Movements Can Save Democracy…
Della Porta Paperback R578 Discovery Miles 5 780
Advanced Introduction to Elections and…
Ian McAllister Paperback R610 Discovery Miles 6 100
Party Realignment in Western Europe…
Magnus Hagevi, Sofie Blomback, … Hardcover R3,074 Discovery Miles 30 740
Is This Any Way to Run a Democratic…
Stephen Wayne Hardcover R4,155 Discovery Miles 41 550
Communism and Democracy - History…
Mike Makin-Waite Paperback R586 Discovery Miles 5 860
Images of Voting/Visions of Democracy
Peter Natchez Paperback R1,426 Discovery Miles 14 260

 

Partners