Buch, Englisch, Band 1173, 713 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1089 g
Theory and Applications of Dependable Computer Systems
1. Auflage 2020
ISBN: 978-3-030-48255-8
Verlag: Springer International Publishing
Proceedings of the Fifteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 29 - July 3, 2020, Brunów, Poland
Buch, Englisch, Band 1173, 713 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1089 g
Reihe: Advances in Intelligent Systems and Computing
ISBN: 978-3-030-48255-8
Verlag: Springer International Publishing
Established in 2006, DepCoS-RELCOMEX is an annual conference series organised by Wroclaw University of Science and Technology. It focuses on the dependability and performability of contemporary computer systems – topics that can provide solutions to new challenges in evaluation of their reliability and efficiency. Since they are probably the most complex technical systems ever engineered by humans, the organization of modern computer systems cannot be modelled and analysed solelyas structures (however complex and distributed) built only on the basis of technical resources. Instead they should be considered as a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, iCloud organisation, Internet of Everything) and a large number of users dispersed geographically and producing an unimaginable number of applications. This new, interdisciplinary approach is developing a continually increasing range of methods which apply also the latest findings in artificial intelligence (AI) and computational intelligence (CI).
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Sequence mining and property verification for fault localization in Simulink models.- Handwritten text lines segmentation using two column projection.- Convolutional Neural Networks for Dot Counting in Fluorescence in Situ Hybridization Imaging.- Classification of Local Administrative Units in Poland: Spatial Approach.- Development of Methodology for Counteraction to Cyber-attacks in Wireless Sensor Networks.- The Need to Use a Hash Function to Build a Crypto Algorithm for Blockchain.- Common Criteria vulnerability assessment ontology.- Risk Management Approach for Revitalization of Post-Mining Areas.- CVE based classification of vulnerable IoT systems.- Reliability and Availability Analysis of Critical Infrastructure Composed of Dependent Systems.