You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 21st International Conference on Theorem Proving in Higher Order Logics, TPHOLs 2008, held in Montreal, Canada, in August 2008. The 17 revised full papers presented together with 1 proof pearl (concise and elegant presentations of interesting examples), 5 tool presentations, and 2 invited papers were carefully reviewed and selected from 40 submissions. The papers cover all aspects of theorem proving in higher order logics as well as related topics in theorem proving and verification such as formal semantics of specification, modeling, and programming languages, specification and verification of hardware and software, formalisation of mathematical theories, advances in theorem prover technology, as well as industrial application of theorem provers.
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.
This book constitutes the refereed proceedings of the 4th International Conference on Model and Data Engineering, MEDI 2014, held in Larnaca, Cyprus, in September 2014. The 16 long papers and 12 short papers presented together with 2 invited talks were carefully reviewed and selected from 64 submissions. The papers specifically focus on model engineering and data engineering with special emphasis on most recent and relevant topics in the areas of modeling and models engineering; data engineering; modeling for data management; and applications and tooling.
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of Things (IoT) and decision support systems; pattern recognition and image processing; and semantic web services.
This book features a selection of articles from the second edition of the conference Europe Middle East & North Africa Information Systems and Technologies to Support Learning 2018 (EMENA-ISTL'18), held in Fez, Morocco between 25th and 27th October 2018. EMENA-ISTL’18 was a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences and challenges in information systems & technologies to support learning. The main topics covered are: A) information systems technologies to support education; B) education in science, technology, engineering and Mathematics; C) emerging technologies in education learning innov...
Software is the essential enabling means for science and the new economy. It helps us to create a more reliable, flexible and robust society. But software often falls short of our expectations. Current methodologies, tools, and techniques remain expensive and are not yet sufficiently reliable, while many promising approaches have proved to be no more than case-by-case oriented methods. This book contains extensively reviewed papers from the eleventh International Conference on New Trends in software Methodology, Tools and Techniques (SoMeT_12), held in Genoa, Italy, in September 2012. The conference provides an opportunity for scholars from the international research community to discuss and...
This book constitutes the proceedings of the 11th International Conference International Conference on Verification and Evaluation of Computer and Communication Systems ( VECoS 2017 ), held at Concordia University, Montreal, Canada, in August 2017. The 13 full papers, together with 3 abstracts in this volume were carefully reviewed and selected from 35 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of verification, control, performance and dependability evalu-ation in order to discuss state-of-the-art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and dis-tributed hardware/software systems.
This book provides glimpses into contemporary research in information systems & technology, learning, artificial intelligence (AI), machine learning, and security and how it applies to the real world, but the ideas presented also span the domains of telehealth, computer vision, the role and use of mobile devices, brain–computer interfaces, virtual reality, language and image processing and big data analytics and applications. Great research arises from asking pertinent research questions. This book reveals some of the authors’ “beautiful questions” and how they develop the subsequent “what if” and “how” questions, offering readers food for thought and whetting their appetite for further research by the same authors.
This book constitutes the best papers selection from the proceedings of the 14th International Conference on Intelligent Software Methodologies, Tools and Techniques, SoMeT 2015, held in Naples, Italy, in September 2015. The 47 full papers presented together with one short paper were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on embedded and mobile software systems, theory and application; real-time systems; requirement engineering, high-assurance and testing system; social networks and big data; cloud computing and semantic web; artificial intelligence techniques and intelligent system design; software development and integration; security and software methodologies for reliable software design; new software techniques in image processing and computer graphics; software applications systems for medical health care.
This book constitutes the refereed proceedings of the 16th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2023, held in Marrakech, Morocco, during October 18–20, 2023. The 12 full papers included in this book were carefully reviewed and selected from 36 submissions. The topics presented covered a range of subjects, including approaches to improving the scalability and efficiency of formal verification and their applications to blockchain, smart contracts and neural networks.