You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Antonio Salvo was a mafioso, but he did not traffic in narcotics, he did not run weapons, he did not kill anyone and he did not take part in the 'ordinary' mafia activities. Salvo was a business man, one of the wealthiest business men in Sicily. He took an interest in all important lines of business and had close political connections at the highest levels in Rome. He represented another, but not less important side of the mafia. He was a central part of the far-reaching network of economic and political interests that dominated Sicily through decades. This book analyses the economic and political activities of the mafia on the basis of the latest source material and explains how the mafia has succeeded in surviving, protecting, and flourishing in post-war Italy.
The book explores the current role of nationality from the point of view of international law, reassessing the validity of the ‘classical’, state-centered, approach to nationality in light of the ‘new’ role the human being is gradually acquiring within the international legal order. In this framework, the collection assesses the impact of international human rights rules on the international discourse on nationality and explores the significance international (including private international) law attaches to the links individuals may establish with states other than that of nationality. The book weighs the significance of the bond of nationality in the context of regional integration systems, and explores the fields of international law in which nationality still plays a pivotal role, such as diplomatic protection and dispute settlement in international investment law. The collection includes contributions from legal scholars of different nationalities and academic backgrounds, and offers an excellent resource for academics, practitioners and students undertaking advanced studies in international law.
This volume contains the research papers, invited papers, and abstracts of - torials presented at the Second International Conference on Tests and Proofs (TAP 2008) held April 9–11, 2008 in Prato, Italy. TAP was the second conference devoted to the convergence of proofs and tests. It combines ideas from both areasfor the advancement of softwarequality. To provethe correctnessof a programis to demonstrate, through impeccable mathematical techniques, that it has no bugs; to test a programis to run it with the expectation of discovering bugs. On the surface, the two techniques seem contradictory: if you have proved your program, it is fruitless to comb it for bugs; and if you are testing it, ...
This book constitutes the refereed proceedings of the 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2010, and the 30th IFIP WG 6.1 Formal Techniques for Networked and Distributed Systems, FORTE 2010, held in Amsterdam, The Netherlands, in June 2010. The 13 revised full papers presented together with 6 short papers and the abstract of one invited talk were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on formal UML modeling; components and architecture; timed process algebra; timed and hybrid automata; program logics and analysis; and reasoning about distributed systems.
This book constitutes the proceedings of the 23rd International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2022, which took place in Philadelphia, PA, USA, in January 2022. The 22 papers presented in this volume were carefully reviewed from 48 submissions. VMCAI provides a forum for researchers working on verification, model checking, and abstract interpretation and facilitates interaction, cross-fertilization, and advancement of hybrid methods that combine these and related areas.
This book constitutes the proceedings of the 17th International Conference on Fundamental Approaches to Software Engineering, FASE 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, which took place in Grenoble, France, in April 2014. The 28 papers included in this volume, together with one invited talk, were carefully reviewed and selected from 125 submissions. They have been organized in topical sections on: modeling and model transformation; time and performance; static analysis; scenario-based specification; software verification; analysis and repair; verification and validation; graph transformation and debugging and testing.
This book constitutes the refereed proceedings of the 10th International Conference on Software Engineering and Formal Methods, SEFM 2012, held in Thessaloniki, Greece, in October 2012. The 19 revised research papers presented together with 3 short papers, 2 tool papers, and 2 invited talks were carefully reviewed and selected from 98 full submissions. The SEFM conference aspires to advance the state-of-the-art in formal methods, to enhance their scalability and usability with regards to their application in the software industry and to promote their integration with practical engineering methods.
This book contains the proceedings of VMCAI 2007. It features current research from the communities of verification, program certification, model checking, debugging techniques, abstract interpretation, abstract domains, and advancement of hybrid methods.
This book constitutes the proceedings of the 18th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2019, held in Belgrade, Serbia, in September 2019. The 43 full papers presented together with 3 abstracts of keynotes were carefully reviewed and selected from 70 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems; industrial management and other applications; machine learning and high performance computing; modelling and optimization; various aspects of computer security.