UID:
almahu_9948352058002882
Format:
XVIII, 713 p. 256 illus., 183 illus. in color.
,
online resource.
Edition:
1st ed. 2020.
ISBN:
9783030482565
Series Statement:
Advances in Intelligent Systems and Computing, 1173
Content:
This book presents selected papers from the Fifteenth International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX), which illustrate the diversity of theoretical problems in analysis of performability, reliability and security of contemporary computer systems. Covering also methodologies and practical tools involved in this field, it is a valuable reference resource for scientists, researchers, practitioners and students who are dealing with these subjects. Established in 2006, DepCoS-RELCOMEX is an annual conference series organised by Wrocław University of Science and Technology. It focuses on the dependability and performability of contemporary computer systems - topics that can provide solutions to new challenges in evaluation of their reliability and efficiency. Since they are probably the most complex technical systems ever engineered by humans, the organization of modern computer systems cannot be modelled and analysed solely as structures (however complex and distributed) built only on the basis of technical resources. Instead they should be considered as a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, iCloud organisation, Internet of Everything) and a large number of users dispersed geographically and producing an unimaginable number of applications. This new, interdisciplinary approach is developing a continually increasing range of methods which apply also the latest findings in artificial intelligence (AI) and computational intelligence (CI).
Note:
Sequence mining and property verification for fault localization in Simulink models -- Handwritten text lines segmentation using two column projection -- Convolutional Neural Networks for Dot Counting in Fluorescence in Situ Hybridization Imaging -- Classification of Local Administrative Units in Poland: Spatial Approach -- Development of Methodology for Counteraction to Cyber-attacks in Wireless Sensor Networks -- The Need to Use a Hash Function to Build a Crypto Algorithm for Blockchain -- Common Criteria vulnerability assessment ontology -- Risk Management Approach for Revitalization of Post-Mining Areas -- CVE based classification of vulnerable IoT systems -- Reliability and Availability Analysis of Critical Infrastructure Composed of Dependent Systems.
In:
Springer eBooks
Additional Edition:
Printed edition: ISBN 9783030482558
Additional Edition:
Printed edition: ISBN 9783030482572
Language:
English
DOI:
10.1007/978-3-030-48256-5
URL:
https://doi.org/10.1007/978-3-030-48256-5