feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1647257875
    Format: Online-Ressource (digital)
    ISBN: 9783540705178
    Series Statement: Lecture Notes in Computer Science 5098
    Content: Inverse Kinematics Using Sequential Monte Carlo Methods -- Estimation of Dense, Non-rigid Motion Fields from a Multi-camera Array Using a Hierarchical Mixture Model -- Learning to Look at Humans — What Are the Parts of a Moving Body? -- Continuous Hand Gesture Recognition in the Learned Hierarchical Latent Variable Space -- Real-Time 3D Body Pose Tracking from Multiple 2D Images -- Applying Space State Models in Human Action Recognition: A Comparative Study -- Bone Glow: An Improved Method for the Assignment of Weights for Mesh Deformation -- Analysis of Human Motion, Based on the Reduction of Multidimensional Captured Data – Application to Hand Gesture Compression, Segmentation and Synthesis -- Exploiting Structural Hierarchy in Articulated Objects Towards Robust Motion Capture -- Estimating Human Skeleton Parameters and Configuration in Real-Time from Markered Optical Motion Capture -- Dealing with Self-occlusion in Region Based Motion Capture by Means of Internal Regions -- Model-Based Analysis and Synthesis of Time-Varying Mesh -- Mesh Vertex Pose and Position Interpolation Using Geometric Algebra -- An Audiovisual Talking Head for Augmented Speech Generation: Models and Animations Based on a Real Speaker’s Articulatory Data -- Towards Efficiency in Cloth Simulation -- 2D Articulated Body Tracking with Self-occultations Handling -- A Two-Step Approach for Detecting Individuals within Dense Crowds -- 3D Modeling for Deformable Objects -- Active-Vision System Reconfiguration for Form Recognition in the Presence of Dynamic Obstacles -- View-Invariant Human Action Detection Using Component-Wise HMM of Body Parts -- A Generative Model for Motion Synthesis and Blending Using Probability Density Estimation -- Gestural Interaction Using Feature Classification -- Predicting Missing Markers to Drive Real-Time Centre of Rotation Estimation -- Accurate Human Motion Capture Using an Ergonomics-Based Anthropometric Human Model -- A Deformable Surface Model with Volume Preserving Springs -- Temporal Nearest End-Effectors for Real-Time Full-Body Human Actions Recognition -- Fusing Edge Cues to Handle Colour Problems in Image Segmentation -- Body-Part Templates for Recovery of 2D Human Poses under Occlusion -- Autonomous Virtual Agents for Performance Evaluation of Tracking Algorithms -- A Manipulable Vision-Based 3D Input Device for Space Curves -- A Comparative Study on Using Zernike Velocity Moments and Hidden Markov Models for Hand Gesture Recognition -- Deformable Volumetric Simplex Meshes -- Analytical Simulation of B-Spline Surfaces Deformation -- Apperance-Based Tracking and Face Identification in Video Sequences -- Interactive Constrained Deformations of NURBS Surfaces: N-SCODEF -- A 3D Shape Descriptor for Human Pose Recovery -- Fast Detection and Modeling of Human-Body Parts from Monocular Video -- Kinetic Pseudo-energy History for Human Dynamic Gestures Recognition -- An Improved Algorithm for Estimating the ICA Model Concerning the Convergence Rate -- Automatic Adjustment of Rigs to Extracted Skeletons -- Real-Time Recognition of Human Gestures for 3D Interaction -- Effective Emotional Classification Combining Facial Classifiers and User Assessment -- Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison -- Users with Disabilities: Maximum Control with Minimum Effort.
    Content: This book constitutes the refereed proceedings of the 5th International Conference on Articulated Motion and Deformable Objects, AMDO 2008, held in Port d'Andratx, Mallorca, Spain, in July 2008. The 36 revised full papers and 7 poster papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical section on computer graphics: human modelling and animation, human motion: analysis, tracking, 3D reconstruction and recognition, multimodal user interaction: VR and ar, speech, biometrics, and advanced multimedia systems: standards, indexed video contents.
    Additional Edition: ISBN 9783540705161
    Additional Edition: Buchausg. u.d.T. Articulated motion and deformable objects Berlin : Springer, 2008 ISBN 3540705163
    Additional Edition: ISBN 9783540705161
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Deformierbares Objekt ; Mensch ; Dreidimensionale Rekonstruktion ; Computeranimation ; Deformierbares Objekt ; Mensch ; Bewegungsanalyse ; Dreidimensionale Rekonstruktion ; Videobearbeitung ; Deformierbares Objekt ; Objekterkennung ; Szenenanalyse ; Erweiterte Realität ; Multimodales System ; Automatische Sprachproduktion ; Dreidimensionale Rekonstruktion ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_1647259886
    Format: Online-Ressource (digital)
    ISBN: 9783540705871
    Series Statement: Lecture Notes in Computer Science 5127
    Content: Autonomy, Incentives and Trust -- A Role-Based Infrastructure for the Management of Dynamic Communities -- PSH: A Private and Shared History-Based Incentive Mechanism -- Cooperation under Scarcity: The Sharer’s Dilemma -- Overlays and Virtualization -- A Distributed Certification System for Structured P2P Networks -- N2N: A Layer Two Peer-to-Peer VPN -- Secure Sharing of an ICT Infrastructure through Vinci -- Load Balancing and Fault Recovery -- Statistical Behaviors of Distributed Transition Planning -- Service Load Balancing with Autonomic Servers: Reversing the Decision Making Process -- An Architecture for Supporting Network Fault Recovery Management -- Network Traffic Engineering and Analysis -- RLTE: Reinforcement Learning for Traffic-Engineering -- SNMP Trace Analysis Definitions -- Convergent Behavior -- Dynamic Consistency Analysis for Convergent Operators -- A Theory of Closure Operators -- PhD Workshop -- Entwined Influences of Users’ Behaviour and QoS: A Multi-model Approach -- Business-Driven Management of Policies in DiffServ Networks -- Token-Based Payment in Dynamic SAML-Based Federations -- Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection -- Towards Resilient Community Wireless Mesh Networks -- Resource Management of Disruption Tolerant Networks -- Design of an IP Flow Record Query Language -- Enabling Next Generation Peer-to-Peer Services.
    Content: This book constitutes the refereed proceedings of the Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008, held in Bremen, Germany, in June 2008, under the auspices of IFIP. The 13 revised full papers presented together with 8 papers of the AIMS PhD workshop were carefully reviewed and selected from 33 submissions to the main conference and 12 papers for the PhD workshop respectively. The papers are discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault recovery, network traffic engineering and analysis, and convergent behavior of distributed systems.
    Additional Edition: ISBN 9783540705864
    Additional Edition: Buchausg. u.d.T. Resilient networks and services Berlin : Springer, 2008 ISBN 3540705864
    Additional Edition: ISBN 9783540705864
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Netzwerkverwaltung ; Netzwerktopologie ; Autonomic Computing ; Trusted Computing ; Fehlertoleranz ; Rechnernetz ; Dienstgüte ; Rechnernetz ; Traffic Engineering ; Netzwerkverwaltung ; Netzwerktopologie ; Autonomic Computing ; Trusted Computing ; Fehlertoleranz ; Rechnernetz ; Dienstgüte ; Rechnernetz ; Traffic Engineering ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1647256852
    Format: Online-Ressource (digital)
    ISBN: 9783540694786
    Series Statement: Lecture Notes in Computer Science 5066
    Content: Interactive TV -- Interactive Television - A Brief Media History -- Interactive Narratives: Exploring the Links between Empathy, Interactivity and Structure -- The Rise and Fall of Juan Perez: Key Pressing Behaviour and Children’s Responses to Interactive Television -- Interactive Authoring -- From Time-Shift to Shape-Shift: Towards Nonlinear Production and Consumption of News -- ShapeShifting Documentary: A Golden Age -- HyLive: Hypervideo-Authoring for Live Television -- Composer: Authoring Tool for iTV Programs -- Ubiquitous Interactive Video Editing Via Multimodal Annotations -- Personalisation and Recommender Systems -- Unobtrusive Dynamic Modelling of TV Program Preferences in a Household -- An Ethnographic Study on Recommendations in the Living Room: Implications for the Design of iTV Recommender Systems -- Recommender System for the Multi-channel TV Production -- A New Approach for a Lightweight Multidimensional TV Content Taxonomy: TV Content Fingerprinting -- Modeling Moods in BBC Programs Based on Emotional Context -- Predicting Future User Behaviour in Interactive Live TV -- Mobile TV -- Does Mobile Television Challenge the Dimension of Viewing Television? An Explorative Research on Time, Place and Social Context of the Use of Mobile Television Content -- Relax or Study?: A Qualitative User Study on the Usage of Mobile TV and Video -- Live Dublin – Mobile Phone Live Video Group Communication Experiment -- A Lightweight Mobile TV Recommender -- Social TV -- Local Communities: Back to Life (Live) Through IPTV -- PresenceRemote: Embracing Ambiguity in the Design of Social TV for Senior Citizens -- Investigating the Use of Voice and Text Chat in a Social Television System -- New TV Environments -- Usages of the Secondary Screen in an Interactive Television Environment: Control, Enrich, Share, and Transfer Television Content -- An Experimental Platform Based on MCE for Interactive TV -- Interactive Coffee Tables: Interfacing TV within an Intuitive, Fun and Shared Experience -- YouTube3D: Accessing Web Video Streams through a 3D Interface -- iTV Architectures and Systems -- ZapTV: Personalized User-Generated Content for Handheld Devices in DVB-H Mobile Networks -- Prototyping Interactive and Personalized IPTV-Services on Top of Open IMS Infrastructures -- A Software Component for Content Management and Delivery to Mobile Phones and Digital Television -- Development of a Generic XML Personality Metadata Handler for Distributed Entertainment Services -- EMTV – A Component-Based DTV Middleware Extension for Educational Purposes -- DVB Service Security—A Problem in Development of Multi-service Television -- User Interfaces and Interaction Design -- Where Have You Ended Up Today? Dynamic TV and the Inter-tainment Paradigm -- Media Space Navigator: Navigating Video Content on IPTV Portals -- An Adaptive Cartography of DTV Programs -- Electronic Programme Guide Design for Preschool Children -- Interaction Design in Television Voting: A Usability Study on Music TV and Input Devices -- User Studies -- What You Expect Is What You See -- ’I Want My HDTV’? Underlying Factors of Perceived Usefulness for High Definition Television -- Prospecting the Appropriation of the Digital TV in a Brazilian Project -- Usability & User Experience: Preliminary Results from Evaluating an IPTV Community Platform -- Accessibility -- iTV as a Platform for Rich Multimedia Reminders for People with Dementia -- A Comparative Study of Remote Controls for Digital TV Receivers.
    Content: This book constitutes the refereed proceedings of the 6th European Conference on Interactive Television, EuroITV 2008, held in Salzburg, Austria, in July 2008. The 42 revised full papers were carefully reviewed and selected from 156 submissions. The contributions cover significant aspects of the interactive television domain including submissions on user studies, technical challenges related to new developments as well as new kind of formats. The papers are organized in topical sections on interactive TV, interactive authoring, personalisation and recommender systems, mobile TV, social TV, new TV environments, iTV architectures and systems, user interfaces and interaction design, user studies, and accessibility.
    Additional Edition: ISBN 9783540694779
    Additional Edition: Buchausg. u.d.T. Changing television environments Berlin : Springer, 2008 ISBN 3540694773
    Additional Edition: ISBN 9783540694779
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Interaktives Fernsehen ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_1647392195
    Format: Online-Ressource (digital)
    ISBN: 9783540850533
    Series Statement: Lecture Notes in Computer Science 5154
    Content: Side-Channel Analysis 1 -- Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform -- Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs -- Multiple-Differential Side-Channel Collision Attacks on AES -- Implementations 1 -- Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? -- Ultra High Performance ECC over NIST Primes on Commercial FPGAs -- Exploiting the Power of GPUs for Asymmetric Cryptography -- Fault Analysis 1 -- High-Performance Concurrent Error Detection Scheme for AES Hardware -- A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis -- RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks -- Random Number Generation -- A Design for a Physical RNG with Robust Entropy Estimators -- Fast Digital TRNG Based on Metastable Ring Oscillator -- Efficient Helper Data Key Extractor on FPGAs -- Side-Channel Analysis 2 -- The Carry Leakage on the Randomized Exponent Countermeasure -- Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths -- Attacking State-of-the-Art Software Countermeasures—A Case Study for AES -- Cryptography and Cryptanalysis -- Binary Edwards Curves -- A Real-World Attack Breaking A5/1 within Hours -- Hash Functions and RFID Tags: Mind the Gap -- Implementations 2 -- A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases -- A Very Compact Hardware Implementation of the MISTY1 Block Cipher -- Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography -- Fault Analysis 2 -- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration -- RFID and Its Vulnerability to Faults -- Perturbating RSA Public Keys: An Improved Attack -- Side-Channel Analysis 3 -- Divided Backend Duplication Methodology for Balanced Dual Rail Routing -- Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages -- Mutual Information Analysis -- Invited Talks -- RSA—Past, Present, Future -- A Vision for Platform Security.
    Content: This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008. The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel analysis, implementations, fault analysis, random number generation, and cryptography and cryptanalysis.
    Additional Edition: ISBN 9783540850526
    Additional Edition: Buchausg. u.d.T. Cryptographic hardware and embedded systems - CHES 2008 Berlin : Springer, 2008 ISBN 354085052X
    Additional Edition: ISBN 9783540850526
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Eingebettetes System ; Hardwareentwurf ; Kryptologie ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1647396603
    Format: Online-Ressource (digital)
    ISBN: 9783540853619
    Series Statement: Lecture Notes in Computer Science 5201
    Content: Invited Papers -- Beyond Nash Equilibrium: Solution Concepts for the 21st Century -- Service Choreography and Orchestration with Conversations -- Knowledge and Information in Probabilistic Systems -- Taming Concurrency: A Program Verification Perspective -- Contributed Papers -- A Model of Dynamic Separation for Transactional Memory -- Completeness and Nondeterminism in Model Checking Transactional Memories -- Semantics of Deterministic Shared-Memory Systems -- A Scalable and Oblivious Atomicity Assertion -- R-Automata -- Distributed Timed Automata with Independently Evolving Clocks -- A Context-Free Process as a Pushdown Automaton -- Modeling Computational Security in Long-Lived Systems -- Contract-Directed Synthesis of Simple Orchestrators -- Environment Assumptions for Synthesis -- Smyle: A Tool for Synthesizing Distributed Models from Scenarios by Learning -- SYCRAFT: A Tool for Synthesizing Distributed Fault-Tolerant Programs -- Subsequence Invariants -- Invariants for Parameterised Boolean Equation Systems -- Unfolding-Based Diagnosis of Systems with an Evolving Topology -- On the Construction of Sorted Reactive Systems -- Dynamic Partial Order Reduction Using Probe Sets -- A Space-Efficient Probabilistic Simulation Algorithm -- Least Upper Bounds for Probability Measures and Their Applications to Abstractions -- Abstraction for Stochastic Systems by Erlang’s Method of Stages -- On the Minimisation of Acyclic Models -- Quasi-Static Scheduling of Communicating Tasks -- Strategy Construction for Parity Games with Imperfect Information -- Mixing Lossy and Perfect Fifo Channels -- On the Reachability Analysis of Acyclic Networks of Pushdown Systems -- Spatial and Behavioral Types in the Pi-Calculus -- A Spatial Equational Logic for the Applied ?-Calculus -- Structured Interactional Exceptions in Session Types -- Global Progress in Dynamically Interleaved Multiparty Sessions -- Normed BPA vs. Normed BPP Revisited -- A Rule Format for Associativity -- Deriving Structural Labelled Transitions for Mobile Ambients -- Termination Problems in Chemical Kinetics -- Towards a Unified Approach to Encodability and Separation Results for Process Calculi -- A Notion of Glue Expressiveness for Component-Based Systems.
    Content: This book constitutes the refereed proceedings of the 19th International Conference on Concurrency Theory, CONCUR 2008, held in Toronto, Canada, August 19-22, 2008. The 33 revised full papers presented together with 2 tool papers were carefully reviewed and selected from 120 submissions. The topics include model checking, process calculi, minimization and equivalence checking, types, semantics, probability, bisimulation and simulation, real time, and formal languages.
    Additional Edition: ISBN 9783540853602
    Additional Edition: Buchausg. u.d.T. CONCUR 2008 - concurrency theory Berlin : Springer, 2008 ISBN 354085360X
    Additional Edition: ISBN 9783540853602
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Nebenläufigkeit ; Nebenläufigkeit ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    gbv_1647396476
    Format: Online-Ressource (digital)
    ISBN: 9783540853039
    Series Statement: Lecture Notes in Computer Science 5158
    Content: Trends and Challenges -- Computational Forensics: An Overview -- Computational Methods for Determining Individuality -- Scanner, Printer, and Prints -- Survey of Scanner and Printer Forensics at Purdue University -- Evaluation of Graylevel-Features for Printing Technique Classification in High-Throughput Document Management Systems -- Document Signature Using Intrinsic Features for Counterfeit Detection -- Human Identification -- Automatic Feature Extraction from 3D Range Images of Skulls -- 3D Processing and Visualization of Scanned Forensic Data -- Person Identification Based on Barefoot 3D Sole Shape -- Shoeprints -- Computerized Matching of Shoeprints Based on Sole Pattern -- Shoe-Print Extraction from Latent Images Using CRF -- Linguistics -- Finding Identity Group “Fingerprints” in Documents -- Supporting Law Enforcement in Digital Communities through Natural Language Analysis -- An Intelligent System for Semantic Information Retrieval Information from Textual Web Documents -- Decision Making and Search -- Support of Interviewing Techniques in Physical Access Control Systems -- Application of q-Gram Distance in Digital Forensic Search -- Speech Analysis -- Similarity Visualization for the Grouping of Forensic Speech Recordings -- Handwritten Signature and Speech: Preliminary Experiments on Multiple Source and Classifiers for Personal Identity Verification -- Signatures and Handwriting -- Signature Verification Using a Bayesian Approach -- Stroke-Morphology Analysis Using Super-Imposed Writing Movements -- Invariants Discretization for Individuality Representation in Handwritten Authorship.
    Content: This book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, August 2008. The 19 revised full papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on trends and challenges; scanner, printer, and prints; human identification; shoeprints; linguistics;decision making and search; speech analysis; signatures and handwriting.
    Additional Edition: ISBN 9783540853022
    Additional Edition: Buchausg. u.d.T. Computational forensics Berlin : Springer, 2008 ISBN 3540853022
    Additional Edition: ISBN 9783540853022
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computerforensik ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_164740018X
    Format: Online-Ressource (digital)
    ISBN: 9783540857624
    Series Statement: Lecture Notes in Computer Science 5160
    Content: Using Design Patterns in Formal Methods: An Event-B Approach -- A Unified Approach to Abstract Interpretation, Formal Verification and Testing of C/C++ Modules -- The Three Platonic Models of Divergence-Strict CSP -- Monotonic Abstraction in Action -- Non-interleaving Semantics with Causality for Nondeterministic Dataflow -- Symbolic Reachability for Process Algebras with Recursive Data Types -- Inclusion Test Algorithms for One-Unambiguous Regular Expressions -- Refinement of Kripke Models for Dynamics -- Tomorrow and All our Yesterdays: MTL Satisfiability over the Integers -- A Theory of Pointers for the UTP -- Recasting Constraint Automata into Büchi Automata -- A Complete Realisability Semantics for Intersection Types and Arbitrary Expansion Variables -- Towards Efficient Verification of Systems with Dynamic Process Creation -- An Observational Model for Transactional Calculus of Services Orchestration -- Everything Is PSPACE-Complete in Interaction Systems -- A New Approach for the Construction of Multiway Decision Graphs -- Congruence Results of Scope Equivalence for a Graph Rewriting Model of Concurrent Programs -- Guided Test Generation from CSP Models -- Relaxing Goodness Is Still Good -- Benchmarking Model- and Satisfiability-Checking on Bi-infinite Time -- Formal Analysis of Workflows Using UML 2.0 Activities and Graph Transformation Systems -- Testing Concurrent Objects with Application-Specific Schedulers -- A Theory of Bounded Fair Scheduling -- Fair Exchange Is Incomparable to Consensus -- Automatic Generation of CSP // B Skeletons from xUML Models -- Bounded Model Checking for Partial Kripke Structures -- Verification of Linear Duration Invariants by Model Checking CTL Properties -- Exact Response Time Scheduling Analysis of Accumulatively Monotonic Multiframe Real Time Tasks -- Endomorphisms for Non-trivial Non-linear Loop Invariant Generation -- Instantiation for Parameterised Boolean Equation Systems.
    Content: This book constitutes the refereed proceedings of the 5th International Colloquium on Theoretical Aspects of Computing, ICTAC 2008 held in Istanbul, Turkey in September 2008. The 27 revised full papers were carefully reviewed and selected from over 70 submissions. The aim of the colloquium is to bring together practitioners and researchers from academia, industry and government to present research results, and exchange experience, ideas, and solutions for their problems in theoretical aspects of computing such as automata theory and formal languages, principles and semantics of programming languages, software architectures and their description languages, software specification, refinement, and verification, model checking and theorem proving, real-time, embedded and hybrid systems, theory of parallel, distributed, and internet-based (grid) computing, simulation and modeling, and service-oriented development.
    Additional Edition: ISBN 9783540857617
    Additional Edition: Buchausg. u.d.T. Theoretical aspects of computing - ICTAC 2008 Berlin : Springer, 2008 ISBN 3540857613
    Additional Edition: ISBN 9783540857617
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Theoretische Informatik ; Model Checking ; Systementwicklung ; Formale Methode ; Softwareentwicklung ; Entwurfsmuster ; Formale Methode ; Kripke-Struktur ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_1647400023
    Format: Online-Ressource (digital)
    ISBN: 9783540857358
    Series Statement: Lecture Notes in Computer Science 5185
    Content: Invited Lecture -- Biometrics – How to Put to Use and How Not at All? -- Trust -- A Map of Trust between Trading Partners -- Implementation of a TCG-Based Trusted Computing in Mobile Device -- A Model for Trust Metrics Analysis -- Authentication, Authorization and Access Control -- Patterns and Pattern Diagrams for Access Control -- A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications -- A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony -- Reputation Systems -- Multilateral Secure Cross-Community Reputation Systems for Internet Communities -- Fairness Emergence through Simple Reputation -- Combining Trust and Reputation Management for Web-Based Services -- Security Policies and Identity Management -- Controlling Usage in Business Process Workflows through Fine-Grained Security Policies -- Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy -- BusiROLE: A Model for Integrating Business Roles into Identity Management -- Intrusion Detection and Applications of Game Theory to IT Security Problems -- The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset -- A Generic Intrusion Detection Game Model in IT Security -- On the Design Dilemma in Dining Cryptographer Networks -- Privacy -- Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing -- A User-Centric Protocol for Conditional Anonymity Revocation -- Preservation of Privacy in Thwarting the Ballot Stuffing Scheme.
    Content: This book constitutes the refereed proceedings of the 5th International Conference on Trust and Privacy in Digital Business, TrustBus 2008, held in Turin, Italy, in September 2008 in conjunction with DEXA 2008. The 18 revised full papers presented together with 1 invited keynote lecture were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on trust, authentication, authorization and access control, reputation systems, security policies and identity management, intrusion detection and applications of game theory to IT security problems, and privacy.
    Additional Edition: ISBN 9783540857341
    Additional Edition: Buchausg. u.d.T. Trust, privacy and security in digital business Berlin : Springer, 2008 ISBN 3540857346
    Additional Edition: ISBN 9783540857341
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic Commerce ; Datensicherung ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_1647399653
    Format: Online-Ressource (digital)
    ISBN: 9783540856931
    Series Statement: Lecture Notes in Computer Science 5186
    Content: NBiS-2008 Keynote Talk -- Patterns in Internet Architecture -- Wireless Networks -- GAMesh: Automatic Placement of Wireless Mesh Nodes Via Genetic Algorithms -- Context-Aware Loading for Mobile Applications -- Performance Analysis of Angle Routing in MANETs -- Dynamic Network Reconfiguration by Combination of Different Wireless LANs -- Heterogeneous Networks -- Making an Agreement in an Order-Heterogeneous Group -- Performance Evaluation of Two Search Space Reduction Methods for a Distributed Network Architecture -- Prototype of a Workers’ Motion Trace System Using Terrestrial Magnetism and Acceleration Sensors -- Framework Design Supporting QoS-Power Trade-Offs for Heterogeneous Networked Systems -- Ad-Hoc Networks -- Route Cache Based Load Balancing Scheme for Mobile Ad-Hoc Networks -- Performance Evaluation of Load-Balancing Multi-path Routing Protocol for Mobile Ad-Hoc Networks -- A TCP Enhancement for QoS-Aware Mobile Ad-Hoc Networks -- Experimental and Simulation Evaluation of OLSR Protocol for Mobile Ad-Hoc Networks -- P2P, Grid and Internet Computing -- A Multi-Source Streaming Model for Mobile Peer-to-Peer (P2P) Overlay Networks -- Building a Linux Grid on a Virtual Machine Using a Windows Grid -- The Similarity Computing of Documents Based on VSM -- Case Study on the Recovery of a Virtual Large-Scale Disk -- Ad-Hoc and Sensor Networks -- Constant-Width Zones Broadcast Algorithm in Mobile Ad-Hoc Networks -- Orientation-Aware Indoor Localization Path Loss Prediction Model for Wireless Sensor Networks -- S-Web: An Efficient and Self-organizing Wireless Sensor Network Model -- Agent Based Analytical Model for Energy Consumption among Border Nodes in Wireless Sensor Networks -- Intelligent Algorithms and Systems -- A Self-organising Network Based on Lightweight Agents -- A Fuzzy-Based Handover System for Wireless Cellular Networks: A Case Study for Handover Enforcement -- Fault Tolerance for Small-World Cellular Neural Networks -- A 4+1 Bit Month-Scale Regularity Mining Algorithm with One-Path and Distributed Server Constraints for Mobile Internet -- Secure Systems and Applications -- Preventing Illegal Information Flow Based on Role-Based Access Control Model -- Authentication Binding between TLS and HTTP -- Embedding Legacy Keyword Search into Queries for the Ubiquitous ID Database -- Secure Ubiquitous Health Monitoring System -- Network Tools and Architectures -- COMANCHE: An Architecture for Software Configuration Management in the Home Environment -- Graphic Drawing Tools for Network Traffic Simulation -- A Methodology for the Enterprise Information and Communication Infrastructure Design Process -- A New Networked Surveillance Video System by Combination of Omni-Directional and Network Controlled Cameras.
    Content: This book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, NBIS 2008, held in Turin, Italy, September 1-5, 2008 in conjunction with Dexa 2008. The 32 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in topical sections on wireless networks; heterogeneous networks; ad hoc networks; P2P, grid and internet computing; ad hoc and sensor networks; intelligent algorithms and systems; secure systems and applicatinos as well as network tools and architectures.
    Additional Edition: ISBN 9783540856924
    Additional Edition: Buchausg. u.d.T. Network-based information systems Berlin : Springer, 2008 ISBN 3540856927
    Additional Edition: ISBN 9783540856924
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Informationssystem ; Mobile Computing ; Informationssystem ; Internet ; Informationssystem ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Takizawa, Makoto 1950-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    gbv_1647396859
    Format: Online-Ressource (digital)
    ISBN: 9783540853732
    Series Statement: Lecture Notes in Computer Science 5083
    Content: Graph Parser Combinators -- Testing Erlang Refactorings with QuickCheck -- Optimal Lambda Lifting in Quadratic Time -- The Structure of the Essential Haskell Compiler, or Coping with Compiler Complexity -- XHaskell – Adding Regular Expression Types to Haskell -- Partial Parsing: Combining Choice with Commitment -- Lazy Contract Checking for Immutable Data Structures -- The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction Using an FPGA -- A Supercompiler for Core Haskell -- Checking Dependent Types Using Compiled Code -- Debugging Lazy Functional Programs by Asking the Oracle -- Uniqueness Typing Simplified -- Tabular Expressions and Total Functional Programming -- Speculative Inlining of Predefined Procedures in an R5RS Scheme to C Compiler -- From Contracts Towards Dependent Types: Proofs by Partial Evaluation.
    Content: This book constitutes the thoroughly refereed post-proceedings of the 19th International Workshop on Implementation and Applications of Functional Languages, IFL 2007, held in Freiburg, Germany in September 2007. The 15 revised full papers presented went through two rounds of reviewing and improvement and were selected from 33 submissions. The papers address all current theoretical and methodological issues on functional and function-based languages such as type checking, contract checking, compilation, parallelism, development and debugging, data structures, parsing as well as various performance related concepts.
    Additional Edition: ISBN 9783540853725
    Additional Edition: Buchausg. u.d.T. Implementation and application of functional languages Berlin : Springer, 2008 ISBN 3540853723
    Additional Edition: ISBN 9783540853725
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Funktionale Programmiersprache ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages