You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006. The book presents 36 revised full papers, organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.
This book constitutes the refereed proceedings of the 11th International Symposium on Static Analysis, SAS 2004, held in Verona, Italy in August 2004. The 23 revised full papers presented with an invited paper and abstracts of 3 invited talks were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on program and systems verification, security and safety, pointer analysis, abstract interpretation and algorithms, shape analysis, abstract domain and data structures, shape analysis and logic, and termination analysis.
This two volume set LNCS 9234 and 9235 constitutes the refereed conference proceedings of the 40th International Symposium on Mathematical Foundations of Computer Science, MFCS 2015, held in Milan, Italy, in August 2015. The 82 revised full papers presented together with 5 invited talks were carefully selected from 201 submissions. The papers feature high-quality research in all branches of theoretical computer science. They have been organized in the following topical main sections: logic, semantics, automata, and theory of programming (volume 1) and algorithms, complexity, and games (volume 2).
This book presents intelligent data analysis as a tool to fight against COVID-19 pandemic. The intelligent data analysis includes machine learning, natural language processing, and computer vision applications to teach computers to use big data-based models for pattern recognition, explanation, and prediction. These functions are discussed in detail in the book to recognize (diagnose), predict, and explain (treat) COVID-19 infections, and help manage socio-economic impacts. It also discusses primary warnings and alerts; tracking and prediction; data dashboards; diagnosis and prognosis; treatments and cures; and social control by the use of intelligent data analysis. It provides analysis reports, solutions using real-time data, and solution through web applications details.
This book presents a collection of research papers that address the challenge of how to develop software in a principled way that, in particular, enables reasoning. The individual papers approach this challenge from various perspectives including programming languages, program verification, and the systematic variation of software. Topics covered include programming abstractions for concurrent and distributed software, specification and verification techniques for imperative programs, and development techniques for software product lines. With this book the editors and authors wish to acknowledge – on the occasion of his 60th birthday – the work of Arnd Poetzsch-Heffter, who has made maj...
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Formal Aspects in Security and Trust, FAST 2009, held under the auspices of IFIP WG 1.7 in Eindhoven, The Netherlands, in November 2009 as an event of the Formal Methods Week, FMweek 2009. The 18 revised papers presented together with an abstract of the invited lecture were carefully reviewed and selected from 50 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, Web service security/trust/privacy, grid security, security risk assessment, and case studies.
This book contains the final reports of the workshops held during the 22nd European Conference on Object-Oriented Programming, ECOOP 2008, in Paphos, Cyprus, in July 2008. The 11 collected reports from high-quality workshops - provided by the respective organizers - all are related to selected aspects in the field of object-oriented programming and technology. The topics covered span areas related to object-oriented programming and technology, such as programming languages, aspects, parallel computing, formal techniques, software engineering, tools, and applications.
This is a major musical and cultural history of the sarod, a leading stringed instrument in Hindustani classical music, which documents the cultural origins, historical development and music styles of this instrumental tradition over the last three centuries. It documents the history of its musicians, their social organization, patron groups, modes of patronage, musical and aesthetic developments, instrument design and construction, narratives, musical terminology, and conception of musical sound over this period. In so doing it provides a detailed account of how this community of musicians devised and implemented strategies to deal with the major challenges generated by a succession of poli...