You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Classical computer science textbooks tell us that some problems are 'hard'. Yet many areas, from machine learning and computer vision to theorem proving and software verification, have defined their own set of tools for effectively solving complex problems. Tractability provides an overview of these different techniques, and of the fundamental concepts and properties used to tame intractability. This book will help you understand what to do when facing a hard computational problem. Can the problem be modelled by convex, or submodular functions? Will the instances arising in practice be of low treewidth, or exhibit another specific graph structure that makes them easy? Is it acceptable to use scalable, but approximate algorithms? A wide range of approaches is presented through self-contained chapters written by authoritative researchers on each topic. As a reference on a core problem in computer science, this book will appeal to theoreticians and practitioners alike.
This book describes a cross-domain architecture and design tools for networked complex systems where application subsystems of different criticality coexist and interact on networked multi-core chips. The architecture leverages multi-core platforms for a hierarchical system perspective of mixed-criticality applications. This system perspective is realized by virtualization to establish security, safety and real-time performance. The impact further includes a reduction of time-to-market, decreased development, deployment and maintenance cost, and the exploitation of the economies of scale through cross-domain components and tools. Describes an end-to-end architecture for hypervisor-level, chi...
In the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have dramatically improved the quality of software, the computer science community continues to address the problems of security by developing a theory of formal verification; a body of methodologies, algorithms and software tools for finding and eliminating bugs and security hazards. This book presents lectures delivered at the NATO Advanced Study Institute (ASI) School Marktoberdorf 2015 – ‘Verifi...
Recent microfluidic technologies have brought a complete paradigm shift in automating biochemical processing on a tiny lab-on-chip (a.k.a. biochip) that replaces expensive and bulky instruments traditionally used in implementing bench-top laboratory protocols. Biochips have already made a profound impact on various application domains such as clinical diagnostics, DNA analysis, genetic engineering, and drug discovery, among others. They are capable of precisely manipulating micro-/pico-liter quantities of fluids, and provide integrated support for mixing, storage, transportation, and sensing, on-chip. In almost all bioprotocols, sample preparation plays an important role, which includes dilu...
This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for exampl...
This book constitutes the refereed proceedings of the 11th International Conference on Rewriting Techniques and Applications, RTA 2000, held in Norwich, UK, in July 2000. The 15 revised full papers and three system descriptions presented together with two invited contributions were carefully reviewed and selected from 44 submissions. All current aspects of rewriting are addressed.
Almost all technical systems currently either interface with or are themselves largely software systems. Software systems must not harm their environment, but are also often vulnerable to security attacks with potentially serious economic, political, and physical consequences, so a better understanding of security and safety and improving the quality of complex software systems are crucial challenges for the functioning of society. This book presents lectures from the 2018 Marktoberdorf summer school Engineering Secure and Dependable Software Systems, an Advanced Study Institute of the NATO Science for Peace and Security Programme. The lectures give an overview of the state of the art in the...
This volume originates from the School on Embedded Systems held in Veldhoven, The Netherlands, in November 1996 as the first event organized by the European Educational Forum. Besides thoroughly reviewed and revised chapters based on lectures given during the school, additional papers have been solicited for inclusion in the present book in order to complete coverage of the relevant topics. The authors adress professionals involved in the design and management of embedded systems in industry as well as researchers and students interested in a competent survey. The book will convince the reader that many architectural and algorithmic problems in the area of embedded systems have well documented optimal or correct solutions, notably in the fields of real-time computing, distributed computing, and fault-tolerant computing.
This book constitutes the refereed proceedings of the 6th International Conference on Test and Proofs, TAP 2012, held in Prague, Czech Republic, in May/June 2012, as part of the TOOLS 2012 Federated Conferences. The 9 revised full papers presented together with 2 invited papers, 4 short papers and one tutorial were carefully reviewed and selected from 29 submissions. The papers are devoted to the convergence of tests and proofs for developing novel techniques and application that support engineers in building secure, safe, and reliable systems. Among the topics covered are model-based testing; scenario-based testing; complex data structure generation; and the validation of protocols and libraries.
This book constitutes the refereed proceedings of the 17th International Conference on Formal Engineering Methods, ICFEM 2015, held in Paris, France, in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 82 submissions. The papers cover a wide range of topics in the area of formal methods and software engineering and are devoted to advancing the state of the art of applying formal methods in practice. They focus in particular on combinations of conceptual and methodological aspects with their formal foundation and tool support.