![]() |
![]() |
Your cart is empty |
||
Showing 1 - 8 of 8 matches in All Departments
The books in this trilogy capture the foundational core of advanced informatics. The authors make the foundations accessible, enabling students to become effective problem solvers. This first volume establishes the inductive approach as a fundamental principle for system and domain analysis. After a brief introduction to the elementary mathematical structures, such as sets, propositional logic, relations, and functions, the authors focus on the separation between syntax (representation) and semantics (meaning), and on the advantages of the consistent and persistent use of inductive definitions. They identify compositionality as a feature that not only acts as a foundation for algebraic proofs but also as a key for more general scalability of modeling and analysis. A core principle throughout is invariance, which the authors consider a key for the mastery of change, whether in the form of extensions, transformations, or abstractions. This textbook is suitable for undergraduate and graduate courses in computer science and for self-study. Most chapters contain exercises and the content has been class-tested over many years in various universities.
This book provides insights from research and practice in how organizations were able to sustain resilience in their global supply chains during the COVID-19 pandemic and to advance the understanding of supply chain risk management. The chapters highlight the lessons learned, insist on new models for resilience, suggest improved supply chain risk methodologies and bridge the gap between research and practice. It helps readers acquire greater knowledge, strategic approaches, new methods, and practical tools for ensuring global supply chain resilience.
The books in this trilogy capture the foundational core of advanced informatics. The authors make the foundations accessible, enabling students to become effective problem solvers. This first volume establishes the inductive approach as a fundamental principle for system and domain analysis. After a brief introduction to the elementary mathematical structures, such as sets, propositional logic, relations, and functions, the authors focus on the separation between syntax (representation) and semantics (meaning), and on the advantages of the consistent and persistent use of inductive definitions. They identify compositionality as a feature that not only acts as a foundation for algebraic proofs but also as a key for more general scalability of modeling and analysis. A core principle throughout is invariance, which the authors consider a key for the mastery of change, whether in the form of extensions, transformations, or abstractions. This textbook is suitable for undergraduate and graduate courses in computer science and for self-study. Most chapters contain exercises and the content has been class-tested over many years in various universities.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.
This book constitutes the refereed proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2007, held in Braga, Portugal. Coverage includes software verification, probabilistic model checking and markov chains, automata-based model checking, security, software and hardware verification, decision procedures and theorem provers, as well as infinite-state systems.
Recent years have seen the development of powerful tools for verifying hardware and software systems, as companies worldwide realise the need for improved means of validating their products. There is increasing demand for training in basic methods in formal reasoning so that students can gain proficiency in logic-based verification methods. The second edition of this successful textbook addresses both those requirements, by continuing to provide a clear introduction to formal reasoning which is both relevant to the needs of modern computer science and rigorous enough for practical application. Improvements to the first edition have been made throughout, with extra and expanded sections on SAT solvers, existential/universal second-order logic, micro-models, programming by contract and total correctness. The coverage of model-checking has been substantially updated. Further exercises have been added. Internet support for the book includes worked solutions for all exercises for teachers, and model solutions to some exercises for students.
Logistische Prozessketten und Logistiknetze werden immer komplexer - auch hinsichtlich Kosten, Zeit und Qualitat. Mit diesem Buch soll die Lucke zwischen Anforderungen und Umsetzung im Logistik-Risikomanagement geschlossen werden. Es ist eine konkrete Arbeitshilfe fur Praktiker und stellt anhand zahlreicher Beispiele Konzepte, Methoden und Instrumente vor, die es ermoeglichen, Risiken in der Logistik zu identifizieren und effektiv zu handhaben.
Michael Huth analysiert, welche Faktoren das Risiko der Gefahrgutbeforderung beeinflussen, und entwickelt auf dieser Basis Anforderungen an Aufbau und Funktionalitat eines Entscheidungsunterstutzungssystems. Anhand zweier praxisnaher Beispiele aus der Verkehrspolitik und der Logistikplanung werden die Einsatzmoglichkeiten aufgezeigt.
|
![]() ![]() You may like...
Better Choices - Ensuring South Africa's…
Not available
Greg Mills, Mcebisi Jonas, …
Paperback
|