You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A graduate-level textbook that presents a unified mathematical framework for modeling and analyzing cyber-physical systems, with a strong focus on verification. Verification aims to establish whether a system meets a set of requirements. For such cyber-physical systems as driverless cars, autonomous spacecraft, and air-traffic management systems, verification is key to building safe systems with high levels of assurance. This graduate-level textbook presents a unified mathematical framework for modeling and analyzing cyber-physical systems, with a strong focus on verification. It distills the ideas and algorithms that have emerged from more than three decades of research and have led to the ...
This book constitutes the proceedings of the 14th International Symposium on NASA Formal Methods, NFM 2022, held in Pasadena, USA, during May 24-27, 2022. The 33 full and 6 short papers presented in this volume were carefully reviewed and selected from 118submissions. The volume also contains 6 invited papers. The papers deal with advances in formal methods, formal methods techniques, and formal methods in practice. The focus on topics such as interactive and automated theorem proving; SMT and SAT solving; model checking; use of machine learning and probabilistic reasoning in formal methods; formal methods and graphical modeling languages such as SysML or UML; usability of formal method tools and application in industry, etc.
Doing Business in 2005: Obstacles to Growth is the second in a series of annual reports investigating the scope and manner of regulations that enhance business activity and those that constrain it. New quantitative indicators on business regulations and their enforcement can be compared across more than 130 countries, and over time. The indicators are used to analyze economic outcomes and identify what reforms have worked, where and why. Topics in Doing Business in 2005 include: Licensing and Inspections: Having registered a business, now what? In most countries, firms face a myriad of sector specific licenses as well as inspections to enforce compliance. The Doing Business database construc...
Neural networks have been widely used in many applications, such as image classification and understanding, language processing, and control of autonomous systems. These networks work by mapping inputs to outputs through a sequence of layers. At each layer, the input to that layer undergoes an affine transformation followed by a simple nonlinear transformation before being passed to the next layer. Neural networks are being used for increasingly important tasks, and in some cases, incorrect outputs can lead to costly consequences, hence validation of correctness at each layer is vital. The sheer size of the networks makes this not feasible using traditional methods. In this monograph, the au...
From Desert to Town sheds light on the sedentarisation and integration of Bedouin living in fellahin towns and villages in the Galilee, between 1700 and 2020. The purpose is to analyse the dynamics of the factors and circumstances that led to this migration. Official history has always lacked data on the Bedouin population in Palestine. Historians have recorded the biography of particular elites, and especially in the context of local warfare and tribal antagonisms, but have hitherto neglected ongoing migration from desert life to town life of Bedouin in the Galilee. The historical record is further complicated by the Bedouin themselves, who over time have been reluctant to register with gov...
This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Doing Business in 2005: Obstacles to Growth is the second in a series of annual reports investigating the scope and manner of regulations that enhance business activity and those that constrain it.
The three-volume set, LNCS 11692, LNCS 11693, and LNCS 11694, constitutes the refereed proceedings of the 39th Annual International Cryptology Conference, CRYPTO 2019, held in Santa Barbara, CA, USA, in August 2019. The 81 revised full papers presented were carefully reviewed and selected from 378 submissions. The papers are organized in the following topical sections: Part I: Award papers; lattice-based ZK; symmetric cryptography; mathematical cryptanalysis; proofs of storage; non-malleable codes; SNARKs and blockchains; homomorphic cryptography; leakage models and key reuse. Part II: MPC communication complexity; symmetric cryptanalysis; (post) quantum cryptography; leakage resilience; memory hard functions and privacy amplification; attribute based encryption; foundations. Part III: Trapdoor functions; zero knowledge I; signatures and messaging; obfuscation; watermarking; secure computation; various topics; zero knowledge II; key exchange and broadcast encryption.