You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book discusses the importance of knowledge as an intangible asset, separate from physical entities, that can enable us to understand and/or change the world. It provides a thorough treatment of knowledge, one that is free of ideological and philosophical preconceptions, and which relies exclusively on concepts and principles from the theory of computing and logic. It starts with an introduction to knowledge as truthful and useful information, and its development and management by computers and humans. It analyses the relationship between computational processes and physical phenomena, as well as the processes of knowledge production and application by humans and computers. In turn, the ...
Computation is ubiquitous: modern life would be inconceivable without it.Written as a series of conversations with influential computer scientists, mathematicians and physicists, this book provides access to the inner thinking of those who have made essential contributions to the development of computing and its applications. You will learn about the interviewees' education, career path, influences, methods of work, how they cope with failure and success, how they relax, how they see the future, and much more.The conversations are presented in jargon-free language suitable for a general audience, but with enough technical detail for more specialized readers. The aim of the book is not only to inform and entertain, but also to motivate and stimulate.
This volume is the proceedings of the Ninth International Conference on the Mathematical Foundations of Programming Semantics, held in New Orleans in April 1993. The focus of the conference series is the semantics of programming languages and the mathematics which supports the study of the semantics. The semantics is basically denotation. The mathematics may be classified as category theory, lattice theory, or logic. Recent conferences and workshops have increasingly emphasized applications of the semantics and mathematics. The study of the semantics develops with the mathematics and the mathematics is inspired by the applications in semantics. The volume presents current research in denotational semantics and applications of category theory, logic, and lattice theory to semantics.
This book presents the latest research in formal techniques for distributed systems, including material on theory, applications, tools and industrial usage of formal techniques.
Computer Science has made considerable progress in making complex software and hardware systems more reliable. This is a result of practical experience and continuous process improvement on one side and of a better and deeper understanding of the fundamentals of software and system engineering on the other side. Recent encouraging trends are a strong integration of formal techniques with practical industrial development methods and more advanced support tools such as modelling, verification, and model-checking support systems. This active area of research has a relatively short term horizon with respect to transferring technology to industrial applications. This volume is focusing on techniq...
This Festschrift volume, published in celebration of the 25th Anniversary of Model Checking, features papers based on talks at the symposium "25 Years of Model Checking", 25MC, which was part of the 18th International Conference on Computer Aided Verification.
Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. Th...
This book constitutes the refereed proceedings of the 5th International Conference on Formal Engineering Methods, ICFEM 2003, held in Singapore in November 2003. The 34 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on testing and validation, state diagrams, PVS/HOL, refinement, hybrid systems, Z/Object-Z, Petri nets, timed automata, system modelling and checking, and semantics and synthesis.
This book constitutes the refereed proceedings of the 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2000, held as part of ETAPS 2000 in Berlin, Germany, in March/April 2000. The 33 revised full papers presented together with one invited paper and two short tool descriptions were carefully reviewed and selected from a total of 107 submissions. The papers are organized in topical sections on software and formal methods, formal methods, timed and hybrid systems, infinite and parameterized systems, diagnostic and test generation, efficient model checking, model-checking tools, symbolic model checking, visual tools, and verification of critical systems.
The development of connected, communicating objects is showing no signs of slowing down. With an increasing number of objects available on the market, the evolution of the Internet of Things is leading to more and more fields being explored via information and communication sciences. This book analyzes the ecosystem of the Internet of Things by retracing the historical and technological context of the Internet's evolution from traditional to dynamic, social and semantic, and then towards this ecosystem of connected objects. The evolution of concepts surrounding the Internet of Things is explored via real-life examples of connected objects; both those used for specific functions and for more general everyday objects. Numerous issues associated with these new technological and digital transformations in a "hyperconnected" world, as well as the impact of the massive influx of connected objects, are discussed. The crucial questions of potential intrusion into the private lives of users as well that of security are then studied.