語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advances in Dependability Engineerin...
~
Zamojski, Wojciech.
Advances in Dependability Engineering of Complex Systems = Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017, Brunów, Poland /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Advances in Dependability Engineering of Complex Systems/ edited by Wojciech Zamojski, Jacek Mazurkiewicz, Jarosław Sugier, Tomasz Walkowiak, Janusz Kacprzyk.
其他題名:
Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017, Brunów, Poland /
其他作者:
Zamojski, Wojciech.
面頁冊數:
XVI, 488 p. 201 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computational intelligence. -
電子資源:
https://doi.org/10.1007/978-3-319-59415-6
ISBN:
9783319594156
Advances in Dependability Engineering of Complex Systems = Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017, Brunów, Poland /
Advances in Dependability Engineering of Complex Systems
Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017, Brunów, Poland /[electronic resource] :edited by Wojciech Zamojski, Jacek Mazurkiewicz, Jarosław Sugier, Tomasz Walkowiak, Janusz Kacprzyk. - 1st ed. 2018. - XVI, 488 p. 201 illus.online resource. - Advances in Intelligent Systems and Computing,5822194-5357 ;. - Advances in Intelligent Systems and Computing,335.
1.Detection of network attacks using hybrid ARIMA-GARCH model- 2.Towards mixed-mode risk management – a concept; Andrzej Bialas and Barbara Flisiuk -- 3.Software support of the Common Criteria vulnerability assessment -- 4.On the performance of some C# constructions -- 5.Deep Stacking Convex Neuro-Fuzzy System and its On-line Learning -- 6.Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection -- 7.Critical Energy Infrastructure Safety Assurance Strategies Considering Emergent Interaction Risk -- 8.Modelling an Optimal Capital Structure of the Telecommunication Company -- 9.Specification of constraints in a System-of-Systems configuration; Dariusz Caban and Tomasz Walkowiak -- 10.A Methodological Framework for Model-based Self-Management of Services and Components in Dependable Cyber-Physical Systems -- 11.Maintenance of wind turbine scheduling based on output power data and wind forecast -- 12.Deadlock detection in distributed systems using the IMDS formalism and Petri nets.- -- 13.Scheduling tasks in embedded systems based on NoC architecture using Simulated Annealing -- 14.Adaptation of Ant Colony Algorithm for CAD of complex systems with higher degree of dependability -- 15.Context-Aware Anomaly Detection in Embedded Systems;Fatemeh Ehsani-Besheli and Hamid R. Zarandi -- 16.Comparative analysis of calculations in cryptographic protocols using a combination of different bases of finite fields -- 17.Dynamic Redundancy in Communication Network of Air Traffic Management System -- 18.Availability models and maintenance strategies for smart building automation systems considering attacks on component vulnerabilities -- 19.Concept of multi-criteria evaluation of the airport security control process -- 20.Extending Continuous Integration with post-mortem debug automation of unhandled exceptions occurred in kernel or user mode applications -- 21.The Methodology of Studying of Active Traffic Management Module Self-Oscillation Regime -- 22.Effectiveness examination of a multi-channel CSMA/CA detector -- 23.IaaS vs. traditional hosting for web applications - cost effectiveness analysis for a local market -- 24.High quality stabilization of an inverted pendulum using the controller based on trigonometric function -- 25.The application of RFID technology in supporting the process of reliable identification of objects in video surveillance systems -- 26.Aspect-oriented management of service requests for assurance of high performance and dependability -- 27.Process of mobile application development from the security perspective -- 28.Managing and Enhancing Performance Benchmarks;Jakub Maleszewski and Janusz Sosnowski -- 29.Reliability Optimization for Controller Placement in Software-Defined Networks -- 30.Agent Approach to Network Systems Experimental Analysis in Case of Critical Situations -- 31.RELIABILITY ASSESSMENT OF DRIVING SYSTEMS OF CITY BUSES;Marek M³yñczak -- 32.Testing the significance of parameters of models estimating execution time of parallel program loops according to the Open MPI standard -- 33.On application of regime-switching models for short-term traffic flow forecasting -- 34.Critical information infrastructure protection model and methodology -- 35.The method of creating players in the marketing strategy;Henryk Piech -- 36.Principles of mobile walking robot control in scope of technical monitoring tasks -- 37.Computer Systems – Simple -- 38.Improving FPGA Implementations of BLAKE and BLAKE2 Algorithms with Memory Resources -- 39.Assurance Case Patterns On-line Catalogue;Monika Szczygielska and Aleksander Jarzêbowicz -- 40.Information system as a cause of cargo handling process disruption in intermodal terminal -- 42.Stability Enhancement Against Fluctuations in Complex Networks by Optimal Bandwidth Allocation -- 43.The scope of the collected data for a holistic risk assessment performance in the road freight transport companies -- 44.Language Processing Modelling Notation – orchestration of NLP microservices -- 45.Type Variety Principle and the Algorithm of Strategic Planning of Diversified Portfolio of Electricity Generation Sources.
This book gathers the proceedings of the 2017 DepCoS-RELCOMEX, an annual conference series that has been organized by the Department of Computer Engineering at the Faculty of Electronics, Wrocław University of Science and Technology, since 2006. Its mission is to continue the heritage of the other two cycles of events – the RELCOMEX conferences (1977–89) and Microcomputer Schools (1985–95) – so this year we can celebrate the 40th anniversary of its origins. In contrast to those preceding series, which were focused on conventional reliability analysis, the goal of DepCoS is to promote a more comprehensive approach to system performability, which is now commonly called dependability. This innovative research area provides answers to the latest challenges in reliability evaluation for contemporary complex systems. Its novelty is based on a multi-disciplinary approach to system theory, technology and maintenance of systems operating in real environments. Dependability analyses concentrate on the efficient completion of tasks, services and jobs by a system considered as a combination of technical, information and human assets, in contrast to “classical” reliability, which is generally limited to the analysis of technical resources and associated components and structures. The selection of papers for this volume illustrates the diversity of topics that need to be considered, from mathematical models and design methodologies through software engineering and data security issues, to practical engineering problems in technical systems. In addition, this edition of the conference hosted the 7th CrISS-DESSERT Workshop, which was devoted to the analysis and assurance of safety and cyber security in critical infrastructure and computer systems.
ISBN: 9783319594156
Standard No.: 10.1007/978-3-319-59415-6doiSubjects--Topical Terms:
568984
Computational intelligence.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Advances in Dependability Engineering of Complex Systems = Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017, Brunów, Poland /
LDR
:07517nam a22003975i 4500
001
989888
003
DE-He213
005
20200706224311.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319594156
$9
978-3-319-59415-6
024
7
$a
10.1007/978-3-319-59415-6
$2
doi
035
$a
978-3-319-59415-6
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
245
1 0
$a
Advances in Dependability Engineering of Complex Systems
$h
[electronic resource] :
$b
Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2 - 6, 2017, Brunów, Poland /
$c
edited by Wojciech Zamojski, Jacek Mazurkiewicz, Jarosław Sugier, Tomasz Walkowiak, Janusz Kacprzyk.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
XVI, 488 p. 201 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
582
505
0
$a
1.Detection of network attacks using hybrid ARIMA-GARCH model- 2.Towards mixed-mode risk management – a concept; Andrzej Bialas and Barbara Flisiuk -- 3.Software support of the Common Criteria vulnerability assessment -- 4.On the performance of some C# constructions -- 5.Deep Stacking Convex Neuro-Fuzzy System and its On-line Learning -- 6.Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection -- 7.Critical Energy Infrastructure Safety Assurance Strategies Considering Emergent Interaction Risk -- 8.Modelling an Optimal Capital Structure of the Telecommunication Company -- 9.Specification of constraints in a System-of-Systems configuration; Dariusz Caban and Tomasz Walkowiak -- 10.A Methodological Framework for Model-based Self-Management of Services and Components in Dependable Cyber-Physical Systems -- 11.Maintenance of wind turbine scheduling based on output power data and wind forecast -- 12.Deadlock detection in distributed systems using the IMDS formalism and Petri nets.- -- 13.Scheduling tasks in embedded systems based on NoC architecture using Simulated Annealing -- 14.Adaptation of Ant Colony Algorithm for CAD of complex systems with higher degree of dependability -- 15.Context-Aware Anomaly Detection in Embedded Systems;Fatemeh Ehsani-Besheli and Hamid R. Zarandi -- 16.Comparative analysis of calculations in cryptographic protocols using a combination of different bases of finite fields -- 17.Dynamic Redundancy in Communication Network of Air Traffic Management System -- 18.Availability models and maintenance strategies for smart building automation systems considering attacks on component vulnerabilities -- 19.Concept of multi-criteria evaluation of the airport security control process -- 20.Extending Continuous Integration with post-mortem debug automation of unhandled exceptions occurred in kernel or user mode applications -- 21.The Methodology of Studying of Active Traffic Management Module Self-Oscillation Regime -- 22.Effectiveness examination of a multi-channel CSMA/CA detector -- 23.IaaS vs. traditional hosting for web applications - cost effectiveness analysis for a local market -- 24.High quality stabilization of an inverted pendulum using the controller based on trigonometric function -- 25.The application of RFID technology in supporting the process of reliable identification of objects in video surveillance systems -- 26.Aspect-oriented management of service requests for assurance of high performance and dependability -- 27.Process of mobile application development from the security perspective -- 28.Managing and Enhancing Performance Benchmarks;Jakub Maleszewski and Janusz Sosnowski -- 29.Reliability Optimization for Controller Placement in Software-Defined Networks -- 30.Agent Approach to Network Systems Experimental Analysis in Case of Critical Situations -- 31.RELIABILITY ASSESSMENT OF DRIVING SYSTEMS OF CITY BUSES;Marek M³yñczak -- 32.Testing the significance of parameters of models estimating execution time of parallel program loops according to the Open MPI standard -- 33.On application of regime-switching models for short-term traffic flow forecasting -- 34.Critical information infrastructure protection model and methodology -- 35.The method of creating players in the marketing strategy;Henryk Piech -- 36.Principles of mobile walking robot control in scope of technical monitoring tasks -- 37.Computer Systems – Simple -- 38.Improving FPGA Implementations of BLAKE and BLAKE2 Algorithms with Memory Resources -- 39.Assurance Case Patterns On-line Catalogue;Monika Szczygielska and Aleksander Jarzêbowicz -- 40.Information system as a cause of cargo handling process disruption in intermodal terminal -- 42.Stability Enhancement Against Fluctuations in Complex Networks by Optimal Bandwidth Allocation -- 43.The scope of the collected data for a holistic risk assessment performance in the road freight transport companies -- 44.Language Processing Modelling Notation – orchestration of NLP microservices -- 45.Type Variety Principle and the Algorithm of Strategic Planning of Diversified Portfolio of Electricity Generation Sources.
520
$a
This book gathers the proceedings of the 2017 DepCoS-RELCOMEX, an annual conference series that has been organized by the Department of Computer Engineering at the Faculty of Electronics, Wrocław University of Science and Technology, since 2006. Its mission is to continue the heritage of the other two cycles of events – the RELCOMEX conferences (1977–89) and Microcomputer Schools (1985–95) – so this year we can celebrate the 40th anniversary of its origins. In contrast to those preceding series, which were focused on conventional reliability analysis, the goal of DepCoS is to promote a more comprehensive approach to system performability, which is now commonly called dependability. This innovative research area provides answers to the latest challenges in reliability evaluation for contemporary complex systems. Its novelty is based on a multi-disciplinary approach to system theory, technology and maintenance of systems operating in real environments. Dependability analyses concentrate on the efficient completion of tasks, services and jobs by a system considered as a combination of technical, information and human assets, in contrast to “classical” reliability, which is generally limited to the analysis of technical resources and associated components and structures. The selection of papers for this volume illustrates the diversity of topics that need to be considered, from mathematical models and design methodologies through software engineering and data security issues, to practical engineering problems in technical systems. In addition, this edition of the conference hosted the 7th CrISS-DESSERT Workshop, which was devoted to the analysis and assurance of safety and cyber security in critical infrastructure and computer systems.
650
0
$a
Computational intelligence.
$3
568984
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computational complexity.
$3
527777
650
1 4
$a
Computational Intelligence.
$3
768837
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Complexity.
$3
669595
700
1
$a
Zamojski, Wojciech.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
787367
700
1
$a
Mazurkiewicz, Jacek.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1255225
700
1
$a
Sugier, Jarosław.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1255226
700
1
$a
Walkowiak, Tomasz.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1255227
700
1
$a
Kacprzyk, Janusz.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
671325
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319594149
776
0 8
$i
Printed edition:
$z
9783319594163
830
0
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
335
$3
1253884
856
4 0
$u
https://doi.org/10.1007/978-3-319-59415-6
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入