You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book presents a remarkable collection of chapters that cover a wide range of topics in the areas of information and communication technologies and their real-world applications. It gathers the Proceedings of the Future of Information and Communication Conference 2019 (FICC 2019), held in San Francisco, USA from March 14 to 15, 2019. The conference attracted a total of 462 submissions from pioneering researchers, scientists, industrial engineers, and students from all around the world. Following a double-blind peer review process, 160 submissions (including 15 poster papers) were ultimately selected for inclusion in these proceedings. The papers highlight relevant trends in, and the late...
Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design for some time. However, their application to the development of large systems requires more emphasis on specification, modeling, and validation techniques supporting the concepts of reusability and modifiability, and their implementation in new extensions of existing programming languages like Java. This book contains 20 revised papers submitted after the 10th Symposium on Formal Methods for Components and Objects, FMCO 2011, which was held in Turin, Italy, in October 2011. Topics covered include autonomic service-component ensembles; trustworthy eternal systems via evolving software, data, and knowledge; parallel patterns for adaptive heterogeneous multicore systems; programming for future 3D architectures with many cores; formal verification of object oriented software; and an infrastructure for reliable computer systems.
Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed. Exploring Security in Software Architecture and Design is an essential reference source that discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is ideally designed for computer and software engineers, ICT specialists, researchers, academicians, and field experts.
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It c...
This book constitutes the refereed proceedings of the 15th International Conference on Augmented Cognition, AC 2021, held as part of the 23rd International Conference, HCI International 2021, held as a virtual event, in July 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. AC 2021 includes a total of 32 papers; they were organized in topical sections named: BCI and brain activity measurement physiological measuring and human performance; modelling human cognition; and augmented cognition in complex environments.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
This book constitutes the refereed proceedings of the 11th International Conference on Fundamental Approaches to Software Engineering, FASE 2008, held in Budapest, Hungary, in March/April 2008 as part of ETAPS 2008, the European Joint Conferences on Theory and Practice of Software. The 26 revised full papers presented together with 5 tool demonstrations were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on requirements and architectures, models and model transformations, conceptual models and UML, service engineering and adaptable services, verification and testing, and objects and components.
The digitization of healthcare has become almost ubiquitous in recent years, spreading from healthcare organizations into the homes and personal appliances of practically every citizen. Thanks to the collective efforts of health professionals, patients and care providers as well as systems developers and researchers, the entire population of Europe is able to participate in and enjoy the benefits of digitized health information. This book presents the proceedings of the 26th Medical Informatics in Europe Conference (MIE2015), held in Madrid, Spain, in May 2015. The conference brings together participants who share their latest achievements in biomedical and health Informatics, including the ...
This book gathers the latest advances, innovations, and applications in the field of sensing technology, as presented by international researchers and engineers at the 15th International Conference on Sensing Technology (ICST), held in Sydney, Australia on December 5–7, 2022. Contributions include a wide range of topics such as: vision sensing, sensor signal processing, sensors phenomena and modelling, sensor characterization, smart sensors and sensor fusion, electromagnetic, chemical and physical sensors, electronic nose technology, biosensors, nano sensors, wireless sensors and WSN, Internet of Things, optical sensors, sensor arrays, intelligent sensing, Internet-based and remote data acquisition. The contributions, which were selected by means of a rigorous international peer-review process, present a wealth of exciting ideas that will open novel research directions and foster multidisciplinary collaboration among different specialists.
This book constitutes the thoroughly refereed proceedings of the Second International Workshop on Trustworthy Eternal Systems via Evolving Software, Data and Knowledge, EternalS, held in Montpellier, France, in August 2012 and co-located with the 20th European Conference on Artificial Intelligence (ECAI 2012). The 10 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized into three main sections: natural language processing (NLP) for software systems, machine learning for software systems, roadmap for future research.