You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This Festschrift volume, published in honor of Ugo Montanari on the occasion of his 65th birthday, contains 43 papers that examine the research areas to which he has contributed, from logic programming to software engineering, as well as his many achievements.
This double volume constitutes the thoroughly refereed post-conference proceedings of the 25th International Conference on Financial Cryptography and Data Security, FC 2021, held online due to COVID-19, in March 2021. The 47 revised full papers and 4 short papers together with 3 as Systematization of Knowledge (SoK) papers were carefully selected and reviewed from 223 submissions. The accepted papers were organized according to their topics in 12 sessions: Smart Contracts, Anonymity and Privacy in Cryptocurrencies, Secure Multi-Party Computation, System and Application Security, Zero-Knowledge Proofs, Blockchain Protocols, Payment Channels, Mining, Scaling Blockchains, Authentication and Usability, Measurement, and Cryptography.
This book constitutes the proceedings of the 15th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2010 held in Antwerp, Belgium, in September 2010 - co-located with ASE 2010, the 25th IEEE/ACM International Conference on Automated Software Engineering, The 14 papers presented were carefully reviewed and selected from 33 submissions. The aim of the FMICS workshop series is to provide a forum for researchers who are interested in the development and application of formal methods in industry. It also strives to promote research and development for the improvement of formal methods and tools for industrial applications.
Annotation. This book constitutes the refereed proceedings of the 8th International Conference on Integrated Formal Methods, IFM 2010, held in Nancy, France, in October 2010. The 20 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 59 submissions. The papers address the spectrum of integrated formal methods, ranging from formal and semiformal notations, semantics, refinement, verification and model transformations to type systems, logics, tools and case studies.
DESCRIPTION "Mastering Zero-knowledge Proofs" is your ultimate guide to blockchain and ZKPs. It connects blockchain's core elements, like distributed ledgers and smart contracts, to ZKPs' advanced privacy solutions, emphasizing their significance in today's digital world, and provides a robust understanding of how these cryptographic techniques can revolutionize security and privacy in various applications. In this book, you will explore the basics of blockchain and ZKPs. You will gain technical skills like group theory and elliptic curve cryptography. Each chapter covers practical applications of ZKPs in blockchain systems, addressing challenges, ongoing research, and real-world use cases a...
This book constitutes the refereed proceedings of the 10th Portuguese Conference on Artificial Intelligence, EPTA 2001, held in Porto, Portugal, in December 2001. The 21 revised long papers and 18 revised short papers were carefully reviewed and selected from a total of 88 submissions. The papers are organized in topical sections on extraction of knowledge from databases, AI techniques for financial time series analysis, multi-agent systems, AI logics and logic programming, constraint satisfaction, and AI planning.
This book constitutes the strictly refereed post-proceedings of the 6th International Workshop on Computational Logic for Multi-Agent Systems, CLIMA VI. The book presents 14 revised full technical papers, 4 contest papers, and 7 invited papers together with 1 invited article are organized in topical sections on foundational aspects of agency, agent programming, agent interaction and normative systems, the first CLIMA contest, and on the project report of the SOCS project.
Deployment is the act of taking components and readying them for productive use. There may be steps following deployment, such as installation or m- agement related functions, but all decisions about how to con?gure and c- pose/assemble a component are made at the deployment stage. This is therefore the one opportunity in the software lifecycle to bridge the gap between what the component developer couldn’t know about the deployment environment and what the environment’s developer couldn’t know about the open set of depl- able components. It is not surprising that deployment as a dedicated step gains importance when addressing issues of system-wide qualities, such as coping with constr...
This book constitutes revised selected papers from the 16th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2019, which was held in Bergamo, Italy, during September 4-6, 2019. The 28 full papers presented in this volume were carefully reviewed and selected from 55 submissions. The papers are grouped in topical sections as follows: Computational Intelligence Methods for Bioinformatics and Biostatistics; Algebraic and Computational Methods for the Study of RNA Behaviour; Intelligence methods for molecular characterization medicine; Machine Learning in Healthcare Informatics and Medical Biology; Modeling and Simulation Methods for Computational Biology and Systems Medicine.
This volume contains the proceedings of AMAST 2002, the 9th International Conference on Algebraic Methodology and Software Technology, held during September 9–13, 2002, in Saint-Gilles-les-Bains, R ́eunion Island, France. The major goal of the AMAST conferences is to promote research that may lead to setting software technology on a ?rm mathematical basis. This goal is achieved through a large international cooperation with contributions from both academia and industry. Developing a software technology on a mathematical basis p- duces software that is: (a) correct, and the correctness can be proved mathem- ically, (b) safe, so that it can be used in the implementation of critical systems,...