You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Haifa Verification Conference, HVC 2007, held in Haifa, Israel, in October 2007. The 15 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from 32 submissions. The papers are organized in topical tracks on hardware verification, model checking, dynamic hardware verification, merging formal and testing, formal verification for software and software testing
The refereed proceedings of the 6th International Symposium on Self-Stabilizing Systems, SSS 2003, held in San Francisco, CA, USA, in June 2003. The 15 revised full papers presented were carefully reviewed and selected from 27 submissions. The papers address self-stabilization issues for various types of systems and software including communication protocols, sensor networks, biological systems, and directed networks; several new algorithms are presented.
These are the conference proceedings of the 4th Haifa Veri?cation Conference, held October 27–30, 2008 in Haifa, Israel. This international conference is a unique venue that brings together leading researchers and practitioners of both formal and dynamic veri?cation, for both hardware and software systems. This year’s conference extended the successes of the previous years, with a largejumpinthenumberofsubmitted papers. Wereceived49totalsubmissions, with many more high-quality papers than we had room to accept. Submissions came from 19 di?erent countries, re?ecting the growing international visibility of the conference. Of the 49 submissions, 43 were regular papers, 2 of which were later...
This book constitutes the thoroughly refereed post-proceedings of the Second International Haifa Verification Conference, HVC 2006, held in Haifa, Israel, in October 2006. The 15 revised full papers presented together with 2 invited lectures are organized in three topical tracks on hardware verification technologies and methodologies, software testing, and tools for hardware verification and software testing.
This book examines women's art writing in the nineteenth century, challenging the idea of art history as a masculine intellectual field.
This book constitutes the refereed proceedings of the 12th International Haifa Verification Conference, HVC 2016, held in Haifa, Israel in November 2016. The 13 revised full papers and one tool paper presented were carefully reviewed and selected from 26 submissions. They are dedicated to advance the state of the art and state of the practice in verification and testing and are discussing future directions of testing and verification for hardware, software, and complex hybrid systems.
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
In this study of three of Barbara Pym’s novels, Naghmeh Varghaiyan, drawing on examinations of women’s humour by Eileen Gillooly, Regina Barreca, and others, shows how the humorous female discourse in Some Tame Gazelle, Excellent Women, and Jane and Prudence undermines patriarchal culture and subverts both female and male stereotypes such as that of the spinster and of the Byronic hero. Varghaiyan reveals how the rhetoric of women’s humour enables Pym’s female characters to survive in the patriarchal culture and to unsettle it.
The constantly evolving technological infrastructure of the modem world presents a great challenge of developing software systems with increasing size, complexity, and functionality. The software engineering field has seen changes and innovations to meet these and other continuously growing challenges by developing and implementing useful software engineering methodologies. Among the more recent advances are those made in the context of software portability, formal verification· techniques, software measurement, and software reuse. However, despite the introduction of some important and useful paradigms in the software engineering discipline, their technological transfer on a larger scale h...
This book constitutes the revised selected papers of the Third International Workshop on Engineering Dependable and Secure Machine Learning Systems, EDSMLS 2020, held in New York City, NY, USA, in February 2020. The 7 full papers and 3 short papers were thoroughly reviewed and selected from 16 submissions. The volume presents original research on dependability and quality assurance of ML software systems, adversarial attacks on ML software systems, adversarial ML and software engineering, etc.