- Book
Authors : Harkut, Dinesh G. (2020) - Cloud computing is the third wave of the digital revolution and it is actually a spectrum of things complementing one another, building on a foundation of sharing. Cloud computing enables simplified functionality of platforms and infrastructure used in IT-enabled industries, so that the end-users can consume what and when they want and pay only for the service they use. Cloud Computing Security Challenges. Cloud Computing Security Services to Mitiga...
|
- Book
Authors : Marwedel, Peter (2021) - Ein Alleinstellungsmerkmal dieses Open-Access-Lehrbuchs ist die umfassende Einführung in das Grundlagenwissen über eingebettete Systeme mit Anwendungen in cyber-physischen Systemen und dem Internet der Dinge. Es beginnt mit einer Einführung in das Gebiet und eine Übersicht über Spezifikationsmodelle und -sprachen für eingebettete und cyber-physikalische Systeme. Es gibt einen kurzen Überblick über die für solche Systeme verwendeten Hardware-Geräte und stellt die Grundlagen der System...
|
- Book
Authors : Lynn, Theo (2020) - Chapter 1 defines the Internet of Things and introduces key concepts and enabling technologies. It provides a sense-making framework that marries technical and socio-technical perspectives and summarises some of
the main Cloud-IoT reference architectures. Chapter 2 revisits conventional cloud computing and discusses how cloud computing is evolving as a result of the Internet of Things. It discusses how new processor architectures and service models are chang...
|
- Book
Authors : Panda, Dhabaleswar K (2020) - This open access book constitutes the refereed proceedings of the 6th Asian Supercomputing Conference, SCFA 2020, which was planned to be held in February 2020. The 8 full papers presented in this book were carefully reviewed and selected from 22 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling. SCFA represents the technical&...
|
- Book
Authors : Lahiri, Shuvendu K. (2020) - Model Checking Automata Tutor v3, Seminator 2 Can Complement Generalized Büchi Automata via Improved
Semi-determinization, RTLola Cleared for Take-Off: Monitoring Autonomous Aircraft, Software Verification
Code2Inv: A Deep Learning Framework for Program Verification. Stochastic Systems Maximum Causal Entropy Specification Inference from Demonstrations. Certifying Certainty and Uncertainty in Approximate Membership
Query Structures. Synthesis Good-Enough Synthesis, Synthesizing JIT Compilers ...
|
- Book
Authors : Hähnle, Reiner (2019) - Software Assurance in an Uncertain World. Software Verification I Tool Support for Correctness-by-Construction. Automatic Modeling of Opaque Code for JavaScript Static Analysis. SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language. A Hybrid Dynamic Logic for Event/Data-Based Systems. Model-Driven Development and Model Transformation Pyro: Generating Domain-Specific Collaborative Online Modeling Environments . Software Verification II DeepFault: Fault Localization...
|
- Book
Authors : Sen, Jaydip (2020) - This book discusses some of the critical security challenges being faced by today’s computing world, as well as mechanisms to defend against them using classical and modern techniques of cryptography. The book is organized into two sections. Section 1 contains six chapters that focus on various aspects of network security. Section 2 consists of three chapters dealing with various mechanisms of cryptography. In Chapter 1, “Introductory Chapter: Machine...
|
- Book
Authors : Lysne, Olav (2018) - Preliminary This book is open access under a CC BY 4.0 license. This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed ligh...
|
- Book
Authors : Abramson, David (2019) - This open access book constitutes the refereed proceedings of the 5th Asian Supercomputing Conference, SCFA 2019, held in Singapore in March 2019. The 6 full papers presented in this book were carefully reviewed and selected from 33 submissions. They cover a range of topics including memory fault handling, linear algebra, image processing, heterogeneous computing, resource usage prediction, and data caching.
|
- Book
Authors : Nielson, Flemming (2019) - This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security&...
|