Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 11 of 11 matches in All Departments
This volume contains a record of some of the lectures and seminars delivered at the Third International School on Engineering Trustworthy Software Systems (SETSS 2017), held in April 2017 at Southwest University in Chongqing, China. The six contributions included in this volume provide an overview of leading-edge research in methods and tools for use in computer system engineering. They have been distilled from six original courses delivered at the school on topics such as: rely/guarantee thinking; Hoare-style specification and verification of object-oriented programs with JML; logic, specification, verification, and interactive proof; software model checking with Automizer; writing programs and proofs; engineering self-adaptive software-intensive systems; and with an additional contribution on the challenges for formal semantic description. The material is useful for postgraduate students, researchers, academics, and industrial engineers, who are interested in the theory and practice of methods and tools for the design and programming of trustworthy software systems.
This book constitutes the refereed proceedings of the Second International Conference on Knowledge Science, Engineering and Management, KSEM 2007, held in Melbourne, Australia, in November 2007. The 42 revised full papers and 28 revised short papers presented together with five invited talks were carefully reviewed and selected. The papers provide new ideas and report research results in the broad areas of knowledge science, knowledge engineering, and knowledge management.
Solving complex problems in real-world contexts, such as financial investment planning or mining large data collections, involves many different sub-tasks, each of which requires different techniques. To deal with such problems, a great diversity of intelligent techniques are available, including traditional techniques like expert systems approaches and soft computing techniques like fuzzy logic, neural networks, or genetic algorithms. These techniques are complementary approaches to intelligent information processing rather than competing ones, and thus better results in problem solving are achieved when these techniques are combined in hybrid intelligent systems. Multi-Agent Systems are ideally suited to model the manifold interactions among the many different components of hybrid intelligent systems. This book introduces agent-based hybrid intelligent systems and presents a framework and methodology allowing for the development of such systems for real-world applications. The authors focus on applications in financial investment planning and data mining.
This book constitutes the proceedings of the 8th CCF Conference on Big Data, BigData 2020, held in Chongqing, China, in October 2020. The 16 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They present recent research on theoretical and technical aspects on big data, as well as on digital economy demands in big data applications.
This book constitutes the refereed proceedings of the 5th International School on Engineering Trustworthy Software Systems, SETSS 2019, held in Chongqing, China, in April 2019. The five chapters in this volume provide lectures on leading-edge research in methods and tools for use in computer system engineering. The topics covered in these chapter include Seamless Model-based System Development: Foundations; From Bounded Reachability Analysis of Linear Hybrid Automata to Verification of Industrial CPS and IoT; Weakest Preexpectation Semantics for Bayesian Inference: Conditioning, Continuous Distributions and Divergence; K - A Semantic Framework for Programming Languages and Formal Analysis Tools; and Software Abstractions and Human-Cyber-Physical Systems Architecture Modelling.
This book constitutes the refereed proceedings of the 10th International Conference on Knowledge Science, Engineering and Management, KSEM 2017, held in Melbourne, Australia, in August 2017. The 35 revised full papers and 12 short papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in the following topical sections: text mining and document analysis; formal semantics and fuzzy logic; knowledge management; knowledge integration; knowledge retrieval; recommendation algorithms and systems; knowledge engineering; and knowledge representation and reasoning.
This volume contains a record of some of the lectures and seminars delivered at the Second International School on Engineering Trustworthy Software Systems (SETSS 2016), held in March/April 2016 at Southwest University in Chongqing, China. The six contributions included in this volume provide an overview of leading-edge research in methods and tools for use in computer system engineering. They have been distilled from six courses and two seminars on topics such as: modelling and verification in event-B; parallel programming today; runtime verification; Java in the safety-critical domain; semantics of reactive systems; parameterized unit testing; formal reasoning about infinite data values; and Alan Turing and his remarkable achievements. The material is useful for postgraduate students, researchers, academics, and industrial engineers, who are interested in the theory and practice of methods and tools for the design and programming of trustworthy software systems.
This volume contains the lecture notes of the five courses and one seminar given at the School on Engineering Trustworthy Software Systems (SETSS 2014), held in September 2014 at Southwest University in Chongqing, China. The material is useful for postgraduate students, researchers, academics and industrial engineers who are interested in the theory and practice of methods and tools for the design and programming of trustworthy software systems. The common themes of the courses include the design and use of theories, techniques and tools for software specification and modeling, analysis and verification. The courses cover sequential programming, component- and object software, hybrid systems and cyber-physical systems with challenges of termination, security, safety, security, fault-tolerance and real-time requirements. The techniques include model checking, correctness by construction through refinement and model transformations, synthesis and computer algebra.
This book constitutes the refereed proceedings of the 8th International Conference on Knowledge Science, Engineering and Management, KSEM 2015, held in Chongqing, China, in October 2015. The 57 revised full papers presented together with 22 short papers and 5 keynotes were carefully selected and reviewed from 247 submissions. The papers are organized in topical sections on formal reasoning and ontologies; knowledge management and concept analysis; knowledge discovery and recognition methods; text mining and analysis; recommendation algorithms and systems; machine learning algorithms; detection methods and analysis; classification and clustering; mobile data analytics and knowledge management; bioinformatics and computational biology; and evidence theory and its application.
The 16th international conference on Multimedia Modeling (MMM2010) was held in the famous mountain city Chongqing, China, January 6-8, 2010, and hosted by Southwest University. MMM is a leading international conference for researchersand industry practitioners to share their new ideas, original research results and practicaldevelopment experiences from all multimedia related areas. MMM2010attractedmorethan160regular, specialsession, anddemosession submissions from 21 countries/regions around the world. All submitted papers were reviewed by at least two PC members or external reviewers, and most of them were reviewed by three reviewers. The review process was very selective. From the total of 133 submissions to the main track, 43 (32. 3%) were accepted as regular papers, 22 (16. 5%) as short papers. In all, 15 papers were received for three special sessions, which is by invitation only, and 14 submissions were received for a demo session, with 9 being selected. Authors of accepted papers come from 16 countries/regions. This volume of the proceedings contains the abstracts of three invited talks and all the regular, short, special session and demo papers. The regular papers were categorized into nine sections: 3D mod- ing;advancedvideocodingandadaptation;face, gestureandapplications;image processing;imageretrieval;learningsemanticconcepts;mediaanalysisandm- eling; semantic video concepts; and tracking and motion analysis. Three special sessions were video analysis and event recognition, cross-X multimedia mining in large scale, and mobile computing and applications. The technical programfeatured three invited talks, paralleloral presentation of all the accepted regular and special session papers, and poster sessions for short and demo pape
This volume contains lectures on leading-edge research in methods and tools for use in computer system engineering; at the 4th International School on Engineering Trustworthy Software Systems, SETSS 2018, held in April 2018 at Southwest University in Chongqing, China. The five chapters in this volume provide an overview of research in the frontier of theories, methods, and tools for software modelling, design, and verification. The topics covered in these chapter include Software Verification with Whiley, Learning Buchi Automata and Its Applications, Security in IoT Applications, Programming in Z3, and The Impact of Alan Turing: Formal Methods and Beyond. The volume provides a useful resource for postgraduate students, researchers, academics, and engineers in industry, who are interested in theory, methods, and tools for the development of trustworthy software.
|
You may like...
Malala - My Story of Standing Up for…
Malala Yousafzai, Patricia McCormick
Paperback
(1)
|