Atjaunināt sīkdatņu piekrišanu

E-grāmata: Complex Systems and Dependability

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - PDF+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Typical contemporary complex system is a multifaceted amalgamation of technical, information, organization, software and human (users, administrators and management) resources. Complexity of such a system comes not only from its involved technical and organizational structure but mainly from complexity of information processes that must be implemented in the operational environment (data processing, monitoring, management, etc.). In such case traditional methods of reliability analysis focused mainly on technical level are usually insufficient in performance evaluation and more innovative methods of dependability analysis must be applied which are based on multidisciplinary approach to theory, technology and maintenance of systems operating in real (and very often unfriendly) environments. This monograph presents selected new developments in such areas of dependability research as system modelling, tools and methodologies for system analysis, data security, secure system design and specific dependability aspects in specialized technical applications. Many practical cases illustrate the universal rule that complexity and multiplicity of system processes, their concurrency and their reliance on embedded intelligence (human and artificial) significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods.
Validation of the Software Supporting Information Security and Business Continuity Management Processes
1(18)
Jacek Baginski
Andrzej Bialas
A Functional Testing Toolset and Its Application to Development of Dependable Avionics Software
19(18)
Vasily Balashov
Alexander Baranov
Maxim Chistolinov
Dmitry Gribov
Ruslan Smeliansky
Specification Means Definition for the Common Criteria Compliant Development Process - An Ontological Approach
37(18)
Andrzej Bialas
Real-Time Gastrointestinal Tract Video Analysis on a Cluster Supercomputer
55(14)
Adam Blokus
Adam Brzeski
Jan Cychnerski
Tomasz Dziubich
Mateusz Jedrzejewski
Detection of Anomalies in a SOA System by Learning Algorithms
69(18)
Ilona Bluemke
Marcin Tarka
Service Availability Model to Support Reconfiguration
87(16)
Dariusz Caban
Tomasz Walkowiak
On Some Statistical Aspects of Software Testing and Reliability
103(12)
Frank P.A. Coolen
Generalizing the Signature to Systems with Multiple Types of Components
115(16)
Frank P.A. Coolen
Tahani Coolen-Maturi
Effective Oblivious Transfer Using a Probabilistic Encryption
131(18)
Alexander Frolov
Gap-and-IMECA-Based Assessment of I&C Systems Cyber Security
149(16)
Vyacheslav Kharchenko
Anton Andrashov
Vladimir Sklyar
Andriy Kovalenko
Olexandr Siora
Approach to Methods of Network Services Exploitation
165(14)
Katarzyna Nowak
Jacek Mazurkiewicz
Pattern Based Support for Site Certification
179(16)
Dariusz Rogowski
Przemyslaw Nowak
Integrating the Best 2-Opt Method to Enhance the Genetic Algorithm Execution Time in Solving the Traveler Salesman Problem
195(14)
Sara Sabba
Salim Chikhi
Representation of Objects in Agent-Based Lighting Design Problem
209(16)
Adam Sedziwy
Formal Methods Supporting Agent Aided Smart Lighting Design
225(16)
Adam Sedziwy
Leszek Kotulski
Marcin Szpyrka
Computational Support for Optimizing Street Lighting Design
241(16)
Adam Sedziwy
Magdalena Kozien-Wozniak
Monitoring Event Logs within a Cluster System
257(16)
Janusz Sosnowski
Marcin Kubacki
Henryk Krawczyk
Implementing AES and Serpent Ciphers in New Generation of Low-Cost FPGA Devices
273(16)
Jaroslaw Sugier
Dependable Strategies for Job-Flows Dispatching and Scheduling in Virtual Organizations of Distributed Computing Environments
289(16)
Victor Toporkov
Alexey Tselishchev
Dmitry Yemelyanov
Alexander Bobchenkov
Controlling Complex Lighting Systems
305(14)
Igor Wojnicki
Leszek Kotulski
Service Renaming in Component Composition
319(12)
Wlodek M. Zuberek
Author Index 331