You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume contains the proceedings of FTRTFT 2002, the International S- posium on Formal Techniques in Real-Time and Fault-Tolerant Systems, held at the University of Oldenburg, Germany, 9–12 September 2002. This sym- sium was the seventh in a series of FTRTFT symposia devoted to problems and solutions in safe system design. The previous symposia took place in Warwick 1990, Nijmegen 1992, Lub ̈ eck 1994, Uppsala 1996, Lyngby 1998, and Pune 2000. Proceedings of these symposia were published as volumes 331, 571, 863, 1135, 1486, and 1926 in the LNCS series by Springer-Verlag. This year the sym- sium was co-sponsored by IFIP Working Group 2.2 on Formal Description of Programming Concepts. ...
Because almost all technical systems are more or less interfaced with software these days, attacks against computer systems can cause considerable economic and physical damage. For this reason, understanding the dependability of such systems, as well as the improvement of cyber security and its development process, are amongst the most challenging and crucial issues in current computer science research. This book contains the lectures from the NATO Advanced Study Institute (ASI) Summer School entitled Engineering Dependable Software Systems, held in Marktoberdorf, Germany, in July and August 2012. This two week course for young computer scientists and mathematicians working in the field of f...
Cyber-physical systems closely combine and coordinate subsystems consisting of both computational and physical elements. Such systems have become indispensable in the fields of aerospace, automotive and the automation industries, as well as in consumer appliances. Safety, security and reliability are all essential elements of the trustworthiness of these modern cyber-physical systems. Protecting the data within such systems from external attack (security) and protecting the environment from any potential malfunction or misuse of these systems (safety) are subjects traditionally considered separately, but a closer look reveals that techniques for the construction and analysis of the software-...
A large class of computing systems can be specified and verified by abstracting away from the temporal aspects of their behavior. In real-time systems,instead, time issues become essential. Their correctness depends not only on which functions they can perform, but also on the action execution time. Due to their importance and design challenges, real-time systems have attracted the attention of a considerable number of computer scientists and engineers from various research areas. This volume collects a set of papers accompanying the lectures of the fourth edition of the International School on Formal Methods for the Design of Computer, Communication and Software Systems (SFM). The school ad...
This book constitutes the refereed proceedings of the Third International Conference on Embedded Software, EMSOFT 2003, held in Philadelphia, PA, USA in October 2003. The 20 revised full papers presented together with three invited papers were carefully reviewed and selected from 60 submissions. All current topics in embedded software are addressed: formal methods and model-based development, middleware and fault tolerance, modelling and analysis, programming languages and compilers, real-time scheduling, resource-aware systems, and systems on a chip.
As a consequence of the wide distribution of software and software infrastructure, information security and safety depend on the quality and excellent understanding of its functioning. Only if this functionality is guaranteed as safe, customer and information are protected against adversarial attacks and malfunction. A vast proportion of information exchange is dominated by computer systems. Due to the fact that technical systems are more or less interfaced with software systems, most information exchange is closely related to software and computer systems.
This book constitutes the refereed proceedings of the 21st International Conference on Application and Theory of Petri Nets, ICATPN 2000, held in Aarhus, Denmark, in June 2000. The 20 revised full papers presented together with four invited surveys and four tool presentations were carefully reviewed and selected from 57 submissions. The papers address all current aspects of Petri net research and development including system design and verification, UML, compositionality, process algebras, model checking, computer networking, business process engineering, communication networks, etc. Various classes of Petri nets are discussed including safe Petri nets, high-level Petri nets, colored Petri nets, P/T nets, and timed Petri nets.
This tutorial volume originates from the 4th Advanced Course on Petri Nets, ACPN 2003, held in Eichstätt, Germany in September 2003. In addition to lectures given at ACPN 2003, additional chapters have been commissioned to give a well-balanced presentation of the state of the art in the area. This book will be useful as both a reference for those working in the area as well as a study book for the reader who is interested in an up-to-date overview of research and development in concurrent and distributed systems; of course, readers specifically interested in theoretical or applicational aspects of Petri nets will appreciate the book as well.
This volume contains papers from the North American Process Algebra Workshop, held in Stony Brook, New York, 28 August 1992. This was the first in a proposed series of workshops, intended to increase awareness of process algebras in the United States and Canada, and to promote their use and development. The workshop was held simultaneously with CONCUR 92, the annual conference on concurrency theories. It provided an important forum for the discussion and exchange of ideas, and allowed recent developments in the application of algebraic techniques to concurrency theory to be presented. The resulting volume provides a good cross-section of current research work in Canada, USA and Europe. Among...
ICT is playing an increasingly important role in both business and individual's private life. It has increased international interconnectedness and speed up the process of globalization. But on the other side the total energy consumption by the communication and networking devices and the relevant global CO emission is increasing exponentially. ICT has, in many ways, a vital role to play. It accounts for about two percent of global CO emissions. Telecommunications applications can have a direct, tangible impact on lowering greenhouse gas emissions, power consumption, and achieve efficient recycling of equipment waste.This book is the outcome of the special session on Green Communications at 'The 12th International Symposium on Wireless Personal Multimedia Communications' (WPMC) held in September '09 in Sendai, Japan. To the best of the editors' knowledge this is the first book on the Green Information and Communication Technologies (ICT) and can be considered a milestone and a key-tool aimed at driving the industrial, scientific and academic efforts of the international community to guarantee a greener future to the whole planet.