You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the tracks and workshops which complemented the 15th European Conference on Software Architecture, ECSA 2021, held in Växjö, Sweden*, in September 2021. The 15 full papers presented in this volume were carefully reviewed and selected from 17 submissions. Papers presented were accepted into the following tracks and workshops: Industry Track; DE&I - Diversity, Equity and Inclusion Track; SAEroCon - 8th Workshop on Software Architecture Erosion and Architectural Consistency; MSR4SA - 1st International Workshop on Mining Software Repositories for Software Architecture; SAML – 1st International Workshop on Software Architecture and Machine Learning; CASA - 4th Context-aware, Autonomous and Smart Architectures International Workshop; FAACS - 5th International Workshop on Formal Approaches for Advanced Computing Systems; MDE4SA - 2nd International Workshop on Model-Driven Engineering for Software Architecture; Tools and Demonstrations Track; Tutorial Track. *The conference was held virtually due to the COVID-19 pandemic.
Inequality has emerged as a key development challenge. It holds implications for economic growth and redistribution and translates into power asymmetries that can endanger human rights, create conflict, and embed social exclusion and chronic poverty. For these reasons, it underpins intense public and academic debates and has become a dominant policy concern within many countries and in all multilateral agencies. It is at the core of the 17 goals of the UN 2030 Agenda for Sustainable Development. This book contributes to this important discussion by presenting assessments of the measurement and analysis of global inequality by leading inequality scholars, aligning these to comprehensive reviews of inequality trends in five of the world's largest developing countries - Brazil, China, India, Mexico, and South Africa.
Este trabalho tem o objetivo de informar a realidade local aos órgãos envolvidos na execução penal, tão diferente de comarca para comarca. O tratamento dado para os reeducandos do semiaberto varia de um lugar para outro, o que pode gerar sensação de injustiça e diminui a efetividade das decisões judiciais. Para uma análise fidedigna, buscou-se obter dados sobre o regime semiaberto nas comarcas de terceira entrância do Estado do Tocantins, em especial, na falta de estabelecimento correicional adequado, qual seja, colônia agrícola ou industrial. De início, procurou-se encontrar o fundamento para a adoção desse regime no Brasil, da forma que a Lei de Execução Penal – Lei nº...
BRAZIL IS SILENTLY CHANGING. Globalization and the massification of technology generate opportunities for new business to emerge and for the transformation of the traditional business people into entrepreneurs. Startups and corporations that noticed this movement are shaping the New Economy, while the most traditional companies remain static, living in the past. The old Brazil allowed poor services and artificial results to perpetuate, but now the dynamic has changed. It seems obvious to say that the world has changed since we entered the information and telecommunication age. By scrolling our smartphone screen, we have the power to transform an entire battlefield. We are always one innovati...
Argues that a people's own cultural heritage is the foundation on which equitable and sustainable development can best be built. The authors provide illustrations from 215 cases in 30 countries, ranging from adult literacy centres to reforestation and conservation efforts.
This book constitutes the refereed proceedings of workshops, held at the 30th International Conference on Conceptual Modeling, ER 2011, in Brussels, Belgium in October/November 2011. The 31 revised full papers presented together with 9 posters and demonstrations (out of 88 submissions) for the workshops and the 6 papers (out of 11 submissions) for the industrial track were carefully reviewed and selected. The papers are organized in sections on the workshops Web Information Systems Modeling (WISM); Modeling and Reasoning for Business Intelligence (MORE-BI); Software Variability Management (Variability@ER); Ontologies and Conceptual Modeling (Onto.Com); Semantic and Conceptual Issues in GIS (SeCoGIS); and Foundations and Practices of UML (FP-UML).
Commissioned by the Society for Modeling and Simulation International (SCS), this needed, useful new ‘Body of Knowledge’ (BoK) collects and organizes the common understanding of a wide collection of professionals and professional associations. Modeling and simulation (M&S) is a ubiquitous discipline that lays the computational foundation for real and virtual experimentation, clearly stating boundaries—and interactions—of systems, data, and representations. The field is well known, too, for its training support via simulations and simulators. Indeed, with computers increasingly influencing the activities of today’s world, M&S is the third pillar of scientific understanding, taking i...
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language