You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Age of Revolution has traditionally been understood as an era of secularization, giving the transition from monarchy to independent republics through democratic movements a genealogy that assumes hostility to Catholicism. By centering the story on Spanish and Latin American actors, Pamela Voekel argues that at the heart of this nineteenth-century transformation in Spanish America was a transatlantic Catholic civil war. Voekel demonstrates Reform Catholicism's significance to the thought and action of the rebel literati who led decolonization efforts in Mexico and Central America, showing how each side of this religious divide operated from within a self-conscious intercontinental network of like-minded Catholics. For its central protagonists, the era's crisis of sovereignty provided a political stage for a religious struggle. Drawing on ecclesiastical archives, pamphlets, sermons, and tracts, For God and Liberty reveals how the violent struggles of decolonization and the period before and after Independence are more legible in light of the fault lines within the Church.
This book contains the proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: * the 21st International Conference on Business Process Modeling, Development and Support, BPMDS 2020, and * the 25th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2020. The conferences were planned to take place in Grenoble, France, during June 8–9, 2020. They were held virtually due to the COVID-19 pandemic. For BPMDS 13 full papers and 1 short paper were carefully reviewed and selected for publication from a total of 30 submissions; for EMMSAD 11 full papers and 4 short papers were accepted from 29 submissions. The papers were organized in topical sections named as follows: BPMDS: Business process execution and monitoring, BPM applications in industry and practice, planning and scheduling in business processes, process mining, process models and visualizations EMMSAD: Requirements and method engineering, enterprise and business modeling, software-related modeling, domain-specific modeling, evaluation-related research.
It is widely recognized that Latinos are a sizable and diverse population and that we are a young demographic. The median age of non-Hispanic white Americans is 58, whereas for Latinos it is 30.Footnote1 Perhaps this partially explains the dearth of attention afforded to the topic of aging Latinos by academic scholarship and the mainstream media. This special issue compellingly alerts us to the reality that there is a growing, aging Latino population about which we know very little and that deserves our attention. I am grateful to Katynka Martínez and Mérida Rúa for curating “The Art of Latina and Latino Elderhood,” since this special issue responds to this significant gap in our know...
This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.
This book is based upon work done under the project "Correct Software through Formal Methods" supported by the German Ministry of Research and Technology. As a case-study report on the practice of formal software development, this book systematically presents and compares 18 different approaches to the control of a real-world production cell. Mathematically precise, formal methods play an increasingly important role in software development, particularly in areas where failure of software would result in injury to people or, at best, significant loss of money. By analyzing the benefits and explaining the use and limitations of formal methods on a sample basis, this book provides a roadmap for the selection and application of appropriate approaches and thus helps in putting formal methods into industrial use.
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.
The RPC-memory specification problem was proposed by Broy and Lamport as a case study in the formal design of distributed and concurrent systems. As a realistic example typical for operating systems and hardware design, the RPC-memory problem was used as the basis for comparing various approaches to formal specification, refinement, and verification. Preliminary solutions were discussed during a workshop at Schloss Dagstuhl, Germany, in September 1994. Then an extensive discussion took place between the referees and authors. Finally 15 thoroughly revised papers were accepted for inclusion in this volume in full detail together with the problem statement and a synopsis.
This volume contains lectures on leading-edge research in methods and tools for use in computer system engineering; at the 4th International School on Engineering Trustworthy Software Systems, SETSS 2018, held in April 2018 at Southwest University in Chongqing, China. The five chapters in this volume provide an overview of research in the frontier of theories, methods, and tools for software modelling, design, and verification. The topics covered in these chapter include Software Verification with Whiley, Learning Büchi Automata and Its Applications, Security in IoT Applications, Programming in Z3, and The Impact of Alan Turing: Formal Methods and Beyond. The volume provides a useful resource for postgraduate students, researchers, academics, and engineers in industry, who are interested in theory, methods, and tools for the development of trustworthy software.
This book explores recent advances in blockchain technology and its impact on Industry 4.0 via advanced technologies. It provides an in-depth analysis of the step by step evolution of Industry 4.0 and blockchain technologies for creating the next-generation, secure, decentralized, distributed and trusted industry environment and enhancing the productivity of industries. The book describes how blockchain technology makes the industrial internet (Industry 4.0) a transparent, reliable and secure environment for people, processes, systems, and services, presenting a strong, technological and conceptual framework and roadmap for decision-makers involved in the transformation of any area of industry.
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy th...