Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Rigorous Development of Complex Fault-Tolerant Systems
  • Language: en
  • Pages: 413

Rigorous Development of Complex Fault-Tolerant Systems

This book brings together 19 papers focusing on the application of rigorous design techniques to the development of fault-tolerant, software-based systems. It is an outcome of the REFT 2005 Workshop on Rigorous Engineering of Fault-Tolerant Systems held in conjunction with the Formal Methods 2005 conference at Newcastle upon Tyne, UK, in July 2005.

Formal Verification of Tree Ensembles in Safety-Critical Applications
  • Language: en
  • Pages: 41

Formal Verification of Tree Ensembles in Safety-Critical Applications

In the presence of data and computational resources, machine learning can be used to synthesize software automatically. For example, machines are now capable of learning complicated pattern recognition tasks and sophisticated decision policies, two key capabilities in autonomous cyber-physical systems. Unfortunately, humans find software synthesized by machine learning algorithms difficult to interpret, which currently limits their use in safety-critical applications such as medical diagnosis and avionic systems. In particular, successful deployments of safety-critical systems mandate the execution of rigorous verification activities, which often rely on human insights, e.g., to identify sce...

Spatio-Temporal Stream Reasoning with Adaptive State Stream Generation
  • Language: en
  • Pages: 153

Spatio-Temporal Stream Reasoning with Adaptive State Stream Generation

A lot of today's data is generated incrementally over time by a large variety of producers. This data ranges from quantitative sensor observations produced by robot systems to complex unstructured human-generated texts on social media. With data being so abundant, making sense of these streams of data through reasoning is challenging. Reasoning over streams is particularly relevant for autonomous robotic systems that operate in a physical environment. They commonly observe this environment through incremental observations, gradually refining information about their surroundings. This makes robust management of streaming data and its refinement an important problem. Many contemporary approach...

Designing a Modern Skeleton Programming Framework for Parallel and Heterogeneous Systems
  • Language: en
  • Pages: 176

Designing a Modern Skeleton Programming Framework for Parallel and Heterogeneous Systems

Today's society is increasingly software-driven and dependent on powerful computer technology. Therefore it is important that advancements in the low-level processor hardware are made available for exploitation by a growing number of programmers of differing skill level. However, as we are approaching the end of Moore's law, hardware designers are finding new and increasingly complex ways to increase the accessible processor performance. It is getting more and more difficult to effectively target these processing resources without expert knowledge in parallelization, heterogeneous computation, communication, synchronization, and so on. To ensure that the software side can keep up, advanced p...

Web Authentication using Third-Parties in Untrusted Environments
  • Language: en
  • Pages: 91

Web Authentication using Third-Parties in Untrusted Environments

With the increasing personalization of the Web, many websites allow users to create their own personal accounts. This has resulted in Web users often having many accounts on different websites, to which they need to authenticate in order to gain access. Unfortunately, there are several security problems connected to the use and re-use of passwords, the most prevalent authentication method currently in use, including eavesdropping and replay attacks. Several alternative methods have been proposed to address these shortcomings, including the use of hardware authentication devices. However, these more secure authentication methods are often not adapted for mobile Web users who use different dev...

System-Level Design of GPU-Based Embedded Systems
  • Language: en
  • Pages: 81

System-Level Design of GPU-Based Embedded Systems

Modern embedded systems deploy several hardware accelerators, in a heterogeneous manner, to deliver high-performance computing. Among such devices, graphics processing units (GPUs) have earned a prominent position by virtue of their immense computing power. However, a system design that relies on sheer throughput of GPUs is often incapable of satisfying the strict power- and time-related constraints faced by the embedded systems. This thesis presents several system-level software techniques to optimize the design of GPU-based embedded systems under various graphics and non-graphics applications. As compared to the conventional application-level optimizations, the system-wide view of our prop...

System-Level Analysis and Design under Uncertainty
  • Language: en
  • Pages: 194

System-Level Analysis and Design under Uncertainty

One major problem for the designer of electronic systems is the presence of uncertainty, which is due to phenomena such as process and workload variation. Very often, uncertainty is inherent and inevitable. If ignored, it can lead to degradation of the quality of service in the best case and to severe faults or burnt silicon in the worst case. Thus, it is crucial to analyze uncertainty and to mitigate its damaging consequences by designing electronic systems in such a way that they effectively and efficiently take uncertainty into account. We begin by considering techniques for deterministic system-level analysis and design of certain aspects of electronic systems. These techniques do not ta...

Critical Information Infrastructure Security
  • Language: en
  • Pages: 408

Critical Information Infrastructure Security

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Critical Information Infrastructures Security, CRITIS 2008, held in Rome, Italy, in October 2008. The 39 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. All the contributions highlight the current development in the field of Critical (Information) Infrastructures and their Protection. Specifically they emphasized that the efforts dedicated to this topic are beginning to provide some concrete results. Some papers illustrated interesting and innovative solutions devoted to understanding, analyzing and modeling a scenario composed by several heterogeneous and interdependent infrastructures. Furthermore, issues concerning crisis management scenarios for interdependent infrastructures have been illustrated. Encouraging preliminarily results have been presented about the development of new technological solutions addressing self-healing capabilities of infrastructures, that is regarded as one of the most promising research topics to improve the infrastructures’ resilience.

Critical Information Infrastructures Security
  • Language: en
  • Pages: 214

Critical Information Infrastructures Security

This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linköping, Sweden, in September 2019. The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.

Ad-hoc, Mobile, and Wireless Networks
  • Language: en
  • Pages: 497

Ad-hoc, Mobile, and Wireless Networks

  • Type: Book
  • -
  • Published: 2012-07-04
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2012 held in Belgrade, Serbia, July 9-11, 2012. The 36 revised full papers presented were carefully reviewed and selected from 76 submissions. The accepted papers cover a wide spectrum of traditional networking topics ranging from routing to the application layer, to localization in various networking environments such as wireless sensor and ad-hoc networks, and give insights in a variety of application areas.