Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

SOFSEM 2020: Theory and Practice of Computer Science
  • Language: en
  • Pages: 725

SOFSEM 2020: Theory and Practice of Computer Science

This book constitutes the refereed proceedings of the 46th International Conference on Current Trends in Theory and Practice of Informatics, SOFSEM 2020, held in Limassol, Cyprus, in January 2020. The 40 full papers presented together with 17 short papers and 3 invited papers were carefully reviewed and selected from 125 submissions. They presented new research results in the theory and practice of computer science in the each sub-area of SOFSEM 2020: foundations of computer science, foundations of data science and engineering, foundations of software engineering, and foundations of algorithmic computational biology.

New Opportunities for Software Reuse
  • Language: en
  • Pages: 193

New Opportunities for Software Reuse

  • Type: Book
  • -
  • Published: 2018-05-09
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 17th International Conference on Software Reuse, ICSR 2018, held in Madrid, Spain, in May 2018. The 9 revised full papers and 2 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: variability management; hierarchies and reuse measures; dependencies and traceability; and software product lines, features and reuse of code rewriters.

Insolvent
  • Language: en
  • Pages: 399

Insolvent

  • Type: Book
  • -
  • Published: 2023-06-06
  • -
  • Publisher: MIT Press

How we can enact meaningful change in computing to meet the urgent need for sustainability and justice. The deep entanglement of information technology with our societies has raised hope for a transition to more sustainable and just communities—those that phase out fossil fuels, distribute public goods fairly, allow free access to information, and waste less. In principle, computing should be able to help. But in practice, we live in a world in which opaque algorithms steer us toward misinformation and unsustainable consumerism. Insolvent shows why computing’s dominant frame of thinking is conceptually insufficient to address our current challenges, and why computing continues to incur s...

Foundations of Software Science and Computation Structures
  • Language: en
  • Pages: 586

Foundations of Software Science and Computation Structures

  • Type: Book
  • -
  • Published: 2018-04-14
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 21st International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 31 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections named: semantics; linearity; concurrency; lambda-calculi and types; category theory and quantum control; quantitative models; logics and equational theories; and graphs and automata.

On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops
  • Language: en
  • Pages: 1047

On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops

This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, France in October/November 2006. The 191 revised full papers presented were carefully reviewed and selected from a total of 493 submissions to the workshops. The first volume begins with 26 additional revised short or poster papers of the OTM 2006 main conferences.

Computational Science and Its Applications – ICCSA 2020
  • Language: en
  • Pages: 1085

Computational Science and Its Applications – ICCSA 2020

The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event. Computational Science is the main pillar of most of the present research, industrial and commercial applications, and plays a unique role in exploiting ICT innovative technologies. The 466 full papers and 32 short papers presented were carefully reviewed and selected from 1450 submissions. Apart from the general track, ICCSA 2020 also include 52 workshops, in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as software engineering, security, machine learning and artificial intelligence, blockchain technologies, and of applications in many fields.

Information and Communications Security
  • Language: en
  • Pages: 574

Information and Communications Security

  • Type: Book
  • -
  • Published: 2004-12-10
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2004, held in Malaga, Spain in October 2004. The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.

Reuse in Emerging Software Engineering Practices
  • Language: en
  • Pages: 309

Reuse in Emerging Software Engineering Practices

This book constitutes the proceedings of the 19th International Conference on Software and Systems Reuse, ICSR 2020, held in Hammamet, Tunesia in December 2020. Due to COVID-19 pandemic the Conference was held virtually. The 16 full papers and 2 short papers included in this book were carefully reviewed and selected from 60 submissions. The papers were organized in topical sections named: modelling, reuse in practice, reengineering, recommendation, and empirical analysis.

Secure Systems Development with UML
  • Language: en
  • Pages: 318

Secure Systems Development with UML

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to developers who are not specialists in security. As one example, Jürjens uncovers a flaw in the Common Electronic Purse Specification, and proposes and verifies a correction. With a clear separation between the general description of his approach and its mathematical foundations, the book is ideally suited both for researchers and graduate students in UML or formal methods and security, and for advanced professionals writing critical applications.

Principles of Security and Trust
  • Language: en
  • Pages: 353

Principles of Security and Trust

  • Type: Book
  • -
  • Published: 2018-04-13
  • -
  • Publisher: Springer

This open access book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018. The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections named: information flow and non-intereference; leakage, information flow, and protocols; smart contracts and privacy; firewalls and attack-defense trees.