Browse Results

Showing 20,851 through 20,875 of 53,525 results

Security Policy in System-on-Chip Designs: Specification, Implementation and Verification

by Sandip Ray Abhishek Basak Swarup Bhunia

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs – current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for “hardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field;Includes discussion of current and emerging approaches for security policy verification.

Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II (Lecture Notes in Computer Science #10992)

by Hovav Shacham Alexandra Boldyreva

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

The Robot and Us: An 'Antidisciplinary' Perspective on the Scientific and Social Impacts of Robotics (Biosystems & Biorobotics #20)

by Maria Chiara Carrozza

This book offers a clear, yet comprehensive overview of the role of robots in our society. It especially focuses on the interaction between humans and robots, and on the social and political aspects of the integration of robots with humans, in their everyday life, both in the private and working sphere alike. Based on the lessons held by the author at “Scuola di Politiche” (transl. School of Political Sciences), this self-contained book mainly addresses an educated, though not-specialist, audience.

Evolving OpenMP for Evolving Architectures: 14th International Workshop on OpenMP, IWOMP 2018, Barcelona, Spain, September 26–28, 2018, Proceedings (Lecture Notes in Computer Science #11128)

by Bronis R. de Supinski Pedro Valero-Lara Xavier Martorell Sergi Mateo Bellido Jesus Labarta

This book constitutes the proceedings of the 14th International Workshop on Open MP, IWOMP 2018, held in Barcelona, Spain, in September 2018.The 16 full papers presented in this volume were carefully reviewed and selected for inclusion in this book. The papers are organized in topical sections named: best paper; loops and OpenMP; OpenMP in heterogeneous systems; OpenMP improvements and innovations; OpenMP user experiences: applications and tools; and tasking evaluations.

Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test

by Arun Chandrasekharan Daniel Große Rolf Drechsler

This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide algorithms and methodologies based on classical formal verification, synthesis and test techniques for an approximate computing IC design flow. This is one of the first books in Approximate Computing that addresses the design automation aspects, aiming for not only sketching the possibility, but providing a comprehensive overview of different tasks and especially how they can be implemented.

Computer Algebra in Scientific Computing: 20th International Workshop, CASC 2018, Lille, France, September 17–21, 2018, Proceedings (Lecture Notes in Computer Science #11077)

by Vladimir P. Gerdt Wolfram Koepf Werner M. Seiler Evgenii V. Vorozhtsov

This book constitutes the proceedings of the 20th International Workshop on Computer Algebra in Scientific Computing, CASC 2018, held in Lille, France, in September 2018. The 24 full papers of this volume presented with an abstract of an invited talk and one paper corresponding to another invited talk were carefully reviewed and selected from 29 submissions. They deal with cutting-edge research in all major disciplines of computer algebra in sciences such as physics, chemistry, life sciences, and engineering.Chapter “Positive Solutions of Systems of Signed Parametric Polynomial Inequalities” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Java üben mit dem Plotter: Ein Überblick für Studierende und Einsteiger (essentials)

by Stephan Euler

Dieses essential zeigt, wie man in Java-Anwendungen mit dem Plotter grafische Darstellungen erzeugen kann. Mit dem Plotter-Objekt – angelehnt an den Stiftplotter, der sich mit Steuerbefehlen über Papier bewegt – wird eine einfache Schnittstelle zur grafischen Programmierung angeboten. Bereits beim Einstieg in die Programmierung entstehen so erste grafische Darstellungen wie z.B. Funktionsverläufe und Simulationsergebnisse. Durch einfache Programmierbeispiele und Aufgaben wird der Umgang mit grundlegenden Konzepten wie Variablen, Kontrollstrukturen, Methoden und Klassen geübt.

Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen

by Florian Skopik Tímea Páhi Maria Leitner

Digitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen. Wie schützen sich Unternehmen und Staaten vor solchen Cyber-Attacken? Ein wichtiger Grundstein ist die Schaffung von Behörden, wie sie die EU-Richtlinie über Maßnahmen zur Gewährleistung eines hohen gemeinsamen Sicherheitsniveaus von Netz- und Informationssystemen (NIS) vorsieht. Das Buch zeigt, wie sich die Zusammenarbeit von Unternehmen mit diesen NIS-Behörden gestaltet mit dem gemeinsamen Ziel, Cyber-Sicherheit zu etablieren und zu gewährleisten. Darüber hinaus legen die Autoren dar, wie sich die NIS-Richtlinie und die im Mai 2018 in Kraft getretene EU-Datenschutz-Grundverordnung (DSGVO) auf Security-Prozesse in Unternehmen auswirken können. Das Buch verknüpft technische, organisatorische und rechtliche Aspekte der Zusammenarbeit und spiegelt damit die Komplexität des Themas wider. Zugleich liefert es zahlreiche Vorschläge zur Umsetzung der EU-Richtlinie. Im Mittelpunkt steht dabei das Konzept der „Cyber Situational Awareness“ – das bewusste Erfassen der aktuellen Lage – und damit ein Instrument, mit dem sich die Reaktionsfähigkeit bei Cyber-Angriffen wesentlich erhöhen lässt. Folgende Themen werden erläutert: • Aufbau und Nutzung von Cyber Situational Awareness • Erstellung von Cyber-Lagebildern auf nationaler Ebene • Informations- und Datenquellen für Cyber-Lagebilder• Informationsaustausch zwischen Cyber-Lagezentren und Stakeholdern • Informations- und Meldepflichten von Unternehmen• Planspiel zur Bildung und Evaluierung von Cyber Situational Awareness

Machines, Mechanism and Robotics: Proceedings of iNaCoMM 2017 (Lecture Notes in Mechanical Engineering)

by D N Badodkar T A Dwarakanath

This book offers a collection of original peer-reviewed contributions presented at the 3rd International and 18th National Conference on Machines and Mechanisms (iNaCoMM), organized by Division of Remote Handling & Robotics, Bhabha Atomic Research Centre, Mumbai, India, from December 13th to 15th, 2017 (iNaCoMM 2017). It reports on various theoretical and practical features of machines, mechanisms and robotics; the contributions include carefully selected, novel ideas on and approaches to design, analysis, prototype development, assessment and surveys. Applications in machine and mechanism engineering, serial and parallel manipulators, power reactor engineering, autonomous vehicles, engineering in medicine, image-based data analytics, compliant mechanisms, and safety mechanisms are covered. Further papers provide in-depth analyses of data preparation, isolation and brain segmentation for focused visualization and robot-based neurosurgery, new approaches to parallel mechanism-based Master-Slave manipulators, solutions to forward kinematic problems, and surveys and optimizations based on historical and contemporary compliant mechanism-based design. The spectrum of contributions on theory and practice reveals central trends and newer branches of research in connection with these topics.

Mobile and Wireless Technology 2018: International Conference on Mobile and Wireless Technology (ICMWT 2018) (Lecture Notes in Electrical Engineering #513)

by Hyuncheol Kim Kuinam J. Kim

This book presents peer-reviewed contributions from the 5th International Conference on Mobile and Wireless Technology (ICMWT 2018), held June 25-27, 2018 in Hong Kong. This conference provided researchers and practitioners from both academia and industry with a platform to keep them abreast of cutting-edge developments in the field. The book includes papers on mobile and wireless networks and their applications, the increasingly important security issues relating to mobile and wireless systems, data management, as well as the latest developments in mobile software development, and multimedia and wireless communications.

Recent Developments in Machine Learning and Data Analytics: IC3 2018 (Advances in Intelligent Systems and Computing #740)

by Jugal Kalita Valentina Emilia Balas Samarjeet Borah Ratika Pradhan

This book presents high-quality papers from an international forum for research on computational approaches to learning. It includes current research and findings from various research labs, universities and institutions that may lead to development of marketable products. It also provides solid support for these findings in the form of empirical studies, theoretical analysis, or comparison to psychological phenomena. Further, it features work that shows how to apply learning methods to solve important application problems as well as how machine learning research is conducted. The book is divided into two main parts: Machine Learning Techniques, which covers machine learning-related research and findings; and, Data Analytics, which introduces recent developments in this domain. Additionally, the book includes work on data analytics using machine learning techniques.

Communication, Networks and Computing: First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #839)

by Shekhar Verma Ranjeet Singh Tomar Brijesh Kumar Chaurasia Vrijendra Singh Jemal Abawajy

This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication system.

Bryan Peterson's Understanding Composition Field Guide: How to See and Photograph Images with Impact

by Bryan F. Peterson

Learn to "see" more compelling images with this on-the-go field guide from Bryan Peterson! What makes an image amazing? Believe it or not, it is not about the content. What makes a photo compelling is the arrangement of that content--in other words, its composition. The right composition gives your images impact and emotion; the wrong one leaves them flat. In this handy, take-anywhere guide, renowned photographer, instructor, and bestselling author Bryan Peterson frees amateur photographers from the prejudices of what is "beautiful" or "ugly" so that they can instead focus on color, line, light, and pattern. Get the tools you need to show your distinct voice and point of view in every image you shoot. With this guide in your camera bag, you'll be equipped not only to "see" beautiful images but to successfully shoot them each and every time. Also available as an ebook

Access 2019 Bible (Bible)

by Richard Kusleika Michael Alexander

Master database creation and management Access 2019 Bible is your, comprehensive reference to the world's most popular database management tool. With clear guidance toward everything from the basics to the advanced, this go-to reference helps you take advantage of everything Access 2019 has to offer. Whether you're new to Access or getting started with Access 2019, you'll find everything you need to know to create the database solution perfectly tailored to your needs, with expert guidance every step of the way. The companion website features all examples and databases used in the book, plus trial software and a special offer from Database Creations. Start from the beginning for a complete tutorial, or dip in and grab what you need when you need it. Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions — but databases can be complex, and difficult to navigate. This book helps you harness the power of the database with a solid understanding of their purpose, construction, and application. Understand database objects and design systems objects Build forms, create tables, manipulate datasheets, and add data validation Use Visual Basic automation and XML Data Access Page design Exchange data with other Office applications, including Word, Excel, and more From database fundamentals and terminology to XML and Web services, this book has everything you need to maximize Access 2019 and build the database you need.

Biologically Inspired Cognitive Architectures: Proceedings of the First International Early Research Career Enhancement School on BICA and Cybersecurity (FIERCES 2017) (Advances in Intelligent Systems and Computing #636)

by Valentin V. Klimov Alexei V. Samsonovich

This book presents cutting-edge research focused on current challenges towards the realization of Biologically Inspired intelligent agents, or Cognitive Architectures (BICA). The chapters are written by both world-recognized experts (including Antonio Chella, Olivier Georgeon, Oliver Kutz, Antonio Lieto, David Vernon, Paul Verschure, and others) and young researchers. Together, they constitute a good mixture of new findings with tutorial-based reviews and position papers, all presented at the First International Early Research Career Enhancement School on Biologically Inspired Cognitive Architectures (FIERCES on BICA 2016), held April 21-24 in Moscow, Russia. Most works included here cross boundaries between disciplines: from neuroscience to social science, from cognitive science to robotics, and from bioengineering to artificial intelligence. A special emphasis is given to novel solutions to urgent problems that have been resisting traditional approaches for decades. Intended for providing readers with an update on biologically inspired approaches towards the computational replication of all the essential aspects of the human mind (the BICA Challenge), this book is expected to foster lively discussions on the topic and stimulate cross-disciplinary, cross-generation and cross-cultural collaboration.

Coastal Ocean Observing: Platforms, Sensors and Systems

by Jorge E. Corredor

This manual describes the wide range of electromechanical, electrochemical and electro-optical transducers at the heart of current field-deployable ocean observing instruments. Their modes of operation, precision and accuracy are discussed in detail. Observing platforms ranging from the traditional to the most recently developed are described, as are the challenges of integrating instrument suits to individual platforms. Technical approaches are discussed to address environmental constraints on instrument and platform operation such as power sources, corrosion, biofouling and mechanical abrasion. Particular attention is also given to data generated by the networks of observing platforms that are typically integrated into value-added data visualization products, including numerical simulations or models. Readers will learn about acceptable data formats and representative model products. The last section of the book is devoted to the challenges of planning, deploying and maintaining coastal ocean observing systems. Readers will discover practical applications of ocean observations in diverse fields including natural resource conservation, commerce and recreation, safety and security, and climate change resiliency and adaptation. This volume will appeal to ocean engineers, oceanographers, commercial and recreational ocean data users, observing systems operators, and advanced undergraduate and graduate students in the field of ocean observing.

Software Engineering Research, Management and Applications (Studies in Computational Intelligence #789)

by Roger Lee

This book presents the outcomes of the 16th International Conference on Software Engineering, Artificial Intelligence Research, Management and Applications (SERA 2018), which was held in Kunming, China on June 13–15, 2018. The aim of the conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science, to share their experiences, and to exchange new ideas and information in a meaningful way. The book includes findings on all aspects (theory, applications and tools) of computer and information science, and discusses related practical challenges and the solutions adopted to solve them.The conference organizers selected the best papers from those accepted for presentation. The papers were chosen based on review scores submitted by members of the program committee and underwent a further rigorous round of review. From this second round, 13 of the conference’s most promising papers were then published in this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.

Speech and Computer: 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18–22, 2018, Proceedings (Lecture Notes in Computer Science #11096)

by Alexey Karpov Oliver Jokisch Rodmonga Potapova

This book constitutes the proceedings of the 20th International Conference on Speech and Computer, SPECOM 2018, held in Leipzig, Germany, in September 2018.The 79 papers presented in this volume were carefully reviewed and selected from 132 submissions. The papers present current research in the area of computer speech processing, including recognition, synthesis, understanding and related domains like signal processing, language and text processing, computational paralinguistics, multi-modal speech processing or human-computer interaction.

ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings (IFIP Advances in Information and Communication Technology #529)

by Lech Jan Janczewski Mirosław Kutyłowski

This book constitutes the refereed proceedings of the 33rd IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.The 27 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in the following topical sections: authentication, failures of security management, security management/forensic, and software security/attacks.

Algorithmen kompakt und verständlich: Lösungsstrategien am Computer

by Markus Von Rimscha

Ameisen organisieren Städtereisen und ein Computer spielt Schach – wie es geht, das zeigt dieses Buch. Auch in der vorliegenden Auflage wird für Programmierer, die bereits erste Erfahrungen gesammelt haben, ein breites Spektrum an Problemlösungsstrategien anhand konkreter und verständlicher Beispiele vorgestellt. <P><P> Sie können künftig selbstständig neue Aufgabenstellungen bewältigen, Optimierungspotential in bestehenden Programmen entdecken und damit bessere Software schreiben.

Soft Computing: Proceedings of SoCTA 2017 (Advances in Intelligent Systems and Computing #742)

by Kanad Ray Tarun K. Sharma Sanyog Rawat R. K. Saini Anirban Bandyopadhyay

The book focuses on soft computing and its applications to solve real-world problems occurring in different domains ranging from medicine and healthcare, and supply chain management to image processing and cryptanalysis. It includes high-quality papers presented in the International Conference on Soft Computing: Theories and Applications (SoCTA 2017), organized by Bundelkhand University, Jhansi, India. Offering significant insights into soft computing for teachers and researchers alike, the book inspires more researchers to work in the field of soft computing.

Microsoft Dynamics 365 For Dummies

by Renato Bellu

Accelerate your digital transformation and break down silos with Microsoft Dynamics 365 It’s no secret that running a business involves several complex parts like managing staff, financials, marketing, and operations—just to name a few. That’s where Microsoft Dynamics 365, the most profitable business management tool, comes in. In Microsoft Dynamics 365 For Dummies, you’ll learn the aspects of the program and each of its applications from Customer Service to Financial Management. With expert author Renato Bellu’s clear instructions and helpful tips, you’ll be managing to your fullest advantage before you know it. Let’s get started! Digitally transform your business by connecting CRM and ERP Use data to make decisions across all business functions Integrate Dynamics 365 with Office 365 and LinkedIn Manage financials and operations Are you running a dynamic business? This book shows you how!

Access 2019 For Dummies

by Laurie A. Ulrich Ken Cook

Easy steps to practical databases People who really know how to build, populate, and simplify databases are few and far between. Access 2019 For Dummies is here to help you join the ranks of office heroes who possess these precious skills. This book offers clear and simple advice on how to build and operate databases as well as create simple forms, import data from outside sources, query databases for information, and share knowledge in reports. In short, it’s the book that holds all the secrets behind the mysteries of Access! Build effective databases from the ground up Simplify your data entry with forms and tables Write queries that produce answers to your data questions Simplify input with forms There’s no time like the present to get your hands on the insight that database beginners need to become Access gurus.

Office 2019 For Dummies

by Wallace Wang

Now updated and revised to cover the latest features of Microsoft Office 2019 The world’s leading suite of business productivity software, Microsoft Office helps users complete common business tasks, including word processing, email, presentations, data management and analysis, and much more. Whether you need accessible instruction on Word, Excel, PowerPoint, Outlook, or Access—or all of the above—this handy reference makes it easier. In Office X For Dummies, you’ll get help with typing and formatting text in Word, creating and navigating an Excel spreadsheet, creating a powerful PowerPoint presentation, adding color, pictures, and sound to a presentation, configuring email with Outlook, designing an Access database, and more. Information is presented in the straightforward but fun language that has defined the Dummies series for more than twenty years. Get insight into common tasks and advanced tools Find full coverage of each application in the suite Benefit from updated information based on the newest software release Make your work life easier and more efficiently If you need to make sense of Office X and don’t have time to waste, this is the trusted reference you’ll want to keep close at hand!

Challenges of the Internet of Things: Technique, Use, Ethics

by Imad Saleh Mehdi Ammi Samuel Szoniecky

This book will examine the issues of IoT according to three complementary axes: technique, use, ethics. The techniques used to produce artefacts (physical objects, infrastructures), programs (algorithms, software) and data (Big data, linked data, metadata, ontologies) are the subject of many innovations as the field of IoT is rich and stimulating. Along with this technological boom, IoT uses colonize new fields of application in the fields of transport, administration, housing, maintenance, health, sports, well-being. ... Privileged interface with digital ecosystems now at the heart of social exchanges, the IoT develops a power to act whose consequences both good and bad make it difficult to assess a fair business.

Refine Search

Showing 20,851 through 20,875 of 53,525 results