You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the First European Conference, Workshops on Model Driven Architecture - Foundations and Applications, ECMDA-FA 2005, held in Nuremberg, Germany in November 2005. The 24 revised full papers presented, 9 papers from the applications track and 15 from the foundations track, were carefully reviewed and selected from 82 submissions. The latest and most relevant information on model driven software engineering in the industrial and academic spheres is provided. The papers are organized in topical sections on MDA development processes, MDA for embedded and real-time systems, MDA and component-based software engineering, metamodelling, model transformation, and model synchronization and consistency.
Embedded and ubiquitous computing systems have considerably increased their scope of application over the past few years, and they now also include missi- and business-critical scenarios. The advances call for a variety of compelling - sues, including dependability, real-time, quality-of-service, autonomy, resource constraints, seamless interaction, middleware support, modeling, veri?cation, validation, etc. The International Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS) brings together experts in the ?eld of emb- ded and ubiquitous computing systems with the aim of exchanging ideas and advancing the state of the art about the above-mentioned issues. I w...
This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. Today’s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they donâ...
This volume constitutes the proceedings of the second International Conference on Generative Programming and Component Engineering (GPCE 2003), held September 22–25, 2003, in Erfurt, Germany, sponsored by the NetObjectDays German industrial software development event, in cooperation with the ACM SIGPLAN and SIGSOFT societies. GPCE was created as an e?ort to bring - getherresearchersworkingonboththeprogramminglanguagesandthesoftware engineeringsideofprogramgenerationandcomponentengineering. Thecommon theme of program generation and component engineering is the domain-speci?c nature of both approaches. Depending on the characteristics of a domain, either a generative or a compositional techn...
This book constitutes the refereed proceedings of the Third International Conference on Generative Programming and Component Engineering, GPCE 2004, held in Vancouver, Canada in October 2004. The 25 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on aspect-orientation, staged programming, types for meta-programming, meta-programming, model-driven approaches, product lines, and domain-specific languages and generation.
This book constitutes the refereed proceedings of the 10th International Conference on Model Driven Engineering Languages and Systems (formerly the UML series of conferences), MODELS 2007, held in Nashville, USA, September 30 - October 5, 2007. The 45 revised full papers were carefully reviewed and selected from 158 initial submissions. The papers are organized in topical sections.
This book constitutes the refereed proceedings of the 17th International Symposium on Formal Methods, FM 2011, held in Limerick, Ireland, in June 2011. The 29 revised full papers presented together with 3 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on cyber-physical systems, runtime analysis, case studies/tools, experience, program compilation and transformation, security, progress algebra, education, concurrency, dynamic structures, and model checking.
This book constitutes the refereed proceedings of the 8th International Conference on Model Driven Engineering Languages and Systems (formerly the UML series of conferences), MoDELS 2005, held in Montego Bay, Jamaica, in October 2005. The 52 revised full papers and 2 keynote abstracts presented were carefully reviewed and selected from an initial submission of 215 abstracts and 166 papers. The papers are organized in topical sections on process modelling, product families and reuse, state/behavioral modeling, aspects, design strategies, model transformations, model refactoring, quality control, MDA automation, UML 2.0, industrial experience, crosscutting concerns, modeling strategies, as well as a recapitulatory section on workshops, tutorials and panels.
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces intr...