30th Annual International Computer Software and Applications Conference (COMPSAC'06).
Author :
Publisher :
Page : pages
File Size : 45,76 MB
Release : 2006
Category :
ISBN : 9781509098064
Author :
Publisher :
Page : pages
File Size : 45,76 MB
Release : 2006
Category :
ISBN : 9781509098064
Author : Andrea de Lucia
Publisher : Springer Science & Business Media
Page : 266 pages
File Size : 34,28 MB
Release : 2009-02-02
Category : Business & Economics
ISBN : 3540958878
The International Summer School on Software Engineering trains future researchers and facilitates the exchange of knowledge between academia and industry. This volume contains papers from recent summer schools and contributions on latest findings in the field.
Author : Hani Ragab Hassen
Publisher : Springer Nature
Page : 150 pages
File Size : 27,57 MB
Release : 2022-02-01
Category : Technology & Engineering
ISBN : 303095918X
Cybersecurity has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. This proceedings of the International Conference on Applied CyberSecurity 2021 (ACS21), held in Dubai on 13 and 14 November, contains thirteen original contributions. More than half of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, phishing email detection, and Botnet detection. This was consistent with the current research and market trends. We divided this book into two parts; the first is focused on machine learning applications to cybersecurity, whereas the second groups the other approaches. This book is suitable for cybersecurity researchers and practitioners as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity.
Author : Norman F. Schneidewind
Publisher : John Wiley & Sons
Page : 608 pages
File Size : 28,45 MB
Release : 2012-03-27
Category : Computers
ISBN : 1118037456
There are many books on computers, networks, and software engineering but none that integrate the three with applications. Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on software engineering typically portray software as if it exists in a vacuum with no relationship to the wider system. This is wrong because a system is more than software. It is comprised of people, organizations, processes, hardware, and software. All of these components must be considered in an integrative fashion when designing systems. On the other hand, books on computers and networks do not demonstrate a deep understanding of the intricacies of developing software. In this book you will learn, for example, how to quantitatively analyze the performance, reliability, maintainability, and availability of computers, networks, and software in relation to the total system. Furthermore, you will learn how to evaluate and mitigate the risk of deploying integrated systems. You will learn how to apply many models dealing with the optimization of systems. Numerous quantitative examples are provided to help you understand and interpret model results. This book can be used as a first year graduate course in computer, network, and software engineering; as an on-the-job reference for computer, network, and software engineers; and as a reference for these disciplines.
Author : Suhel Ahmad Khan
Publisher : CRC Press
Page : 330 pages
File Size : 10,17 MB
Release : 2023-02-13
Category : Computers
ISBN : 1000832597
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.
Author : Petri Mähönen
Publisher : Springer
Page : 352 pages
File Size : 37,52 MB
Release : 2008-12-11
Category : Computers
ISBN : 3540898972
Today it is almost impossible to remember what life was like with no computer, no mobile phone, and no Internet for accessing information, performing tra- actions or exchanging emails and data. New technology is bringing wave after wave of new bene?ts to daily life: organisations are doing business with each other via the Internet; people are ?lling in tax declarations online and booking their next vacation through the Internet. In general we are all progressively - ing (and dependent on) software and services running on computers, connecting mobile phones and other devices, and exchanging information on the Internet. People like to shop around and exercise choice. So do businesses and public administrations. Today they can buy a complete software package that best suits their needs, even though they may never use some of the tools it o?ers, or other desirable tools are not available. In the future they may no longer have to compromise on choice. Alternative approaches like “Software as a Service” and “Computing Resources as a Service” are emerging. Software is provided on-line as a service when and where it is needed, and the same for computing resources needed to run software. Such an approach allows individuals and organisations totapintoande?ectivelyharnesstheimmensewealthofinformation,knowledge and analytical resources when they need them, paying only for what they use. Customersareboundtobene?twhenthereisasu?cientlyrichchoiceofservices.
Author : Rory V. Connor
Publisher : Springer Science & Business Media
Page : 322 pages
File Size : 38,36 MB
Release : 2011-06-22
Category : Computers
ISBN : 3642222056
This volume constitutes the refereed proceedings of the 18th EuroSPI conference, held in Roskilde, Denmark, in June 2011. The 18 revised full papers presented together with 9 key notes were carefully reviewed and selected. They are organized in topical sections on SPI and assessments; SPI and implementation; SPI and improvement methods; SPI organization; SPI people/ teams; SPI and reuse; selected key notes for SPI implementation.
Author : Isak Karabegovic
Publisher : Springer Nature
Page : 775 pages
File Size : 45,43 MB
Release : 2023-05-19
Category : Technology & Engineering
ISBN : 3031310667
This book features papers focusing on the implementation of new and future technologies, which were presented at the International Conference on New Technologies, Development and Application, held at the Academy of Science and Arts of Bosnia and Herzegovina in Sarajevo on 22–24 June 2023. It covers a wide range of future technologies and technical disciplines, including complex systems such as Industry 4.0; patents in industry 4.0; robotics; mechatronics systems; automation; manufacturing; cyber-physical and autonomous systems; sensors; networks; control, energy, and renewable energy sources; automotive and biological systems; vehicular networking and connected vehicles; effectiveness and logistics systems, smart grids, nonlinear systems, power, social and economic systems, education, and IoT. This book is oriented towards Fourth Industrial Revolution “Industry 4.0”, which implementation will improve many aspects of human life in all segments and lead to changes in business paradigms and production models. Further, new business methods are emerging, transforming production systems, transport, delivery, and consumption, which need to be monitored and implemented by every company involved in the global market.
Author : Tim A. Majchrzak
Publisher : Springer
Page : 288 pages
File Size : 31,47 MB
Release : 2018-06-18
Category : Computers
ISBN : 3319935275
This book constitutes revised selected papers from the 13th International Conference on Web Information Systems and Technologies, WEBIST 2017, held in Porto, Portugal, in April 2017. The purpose of the WEBIST series of conferences is to bring together researches, engineers and practitioners interested in technological advances and business applications of web-based information systems. The 12 full papers presented in this volume were carefully reviewed and selected from originally 77 paper submissions. They contribute to the understanding of relevant trends of current research on Web information systems and technologies, comprising unified interfaces, Progressive Web Apps (PWAs) as well as a mobile device taxonomy, XML and open data processing, the history of Web engineering, web development for end-users, access control, Web platform assessment, rule engines, and scientific blogging.
Author : Jane Huang
Publisher : Springer Science & Business Media
Page : 495 pages
File Size : 32,76 MB
Release : 2012-02-02
Category : Computers
ISBN : 1447122380
Software and Systems Traceability provides a comprehensive description of the practices and theories of software traceability across all phases of the software development lifecycle. The term software traceability is derived from the concept of requirements traceability. Requirements traceability is the ability to track a requirement all the way from its origins to the downstream work products that implement that requirement in a software system. Software traceability is defined as the ability to relate the various types of software artefacts created during the development of software systems. Traceability relations can improve the quality of a product being developed, and reduce the time and cost of development. More specifically, traceability relations can support evolution of software systems, reuse of parts of a system by comparing components of new and existing systems, validation that a system meets its requirements, understanding of the rationale for certain design and implementation decisions, and analysis of the implications of changes in the system.