Software components and component-based software development (CBSD) are acknowledged as the best approach for constructing quality software at reasonable cost.
Presents modeling approaches that can be performed in SysML and other modeling languages This book combines the emerging discipline of systems architecting with model-based approaches using SysML.
This six-volume set, LNAI 15387-15392, constitutes the refereed proceedings of the 20th International Conference on Advanced Data Mining and Applications, ADMA 2024, held in Sydney, New South Wales, Australia, during December 3-5, 2024.
The GridNets conference is an annual international meeting that provides a focused and highly interactive forum where researchers and technologists have an opportunity to present and discuss leading research, developments, and future directions in grid networking.
The three-volume set LNCS 12305, 12306, and 12307 constitutes the refereed proceedings of the Third Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2020, held virtually in Nanjing, China, in October 2020.
This book was prepared as the Final Publication of COST Action IC0703 "e;Data Traffic Monitoring and Analysis: theory, techniques, tools and applications for the future networks"e;.
Microservices can have a positive impact on your enterprisejust ask Amazon and Netflixbut you can fall into many traps if you dont approach them in the right way.
This book constitutes the refereed proceedings of the 12th International Conference on Ad Hoc Networks, ADHOCNETS 2020, held in Paris in November 2020.
This eleven-volume set LNCS 14815 - 14825 constitutes the refereed workshop proceedings of the 24th International Conference on Computational Science and Its Applications, ICCSA 2024, held at Hanoi, Vietnam, during July 1-4, 2024.
Transactions on HiPEAC aims at the timely dissemination of research contributions in computer architecture and compilation methods for high-performance embedded computer systems.
This volume presents the proceedings of the 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and of the Third International ICST Workshop on Advanced Architectures and Algorithms for Internet DElivery and Applications.
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads.
As multicriteria decision-making (MCDM) continues to grow and evolve, machine learning (ML) techniques have become increasingly important in finding efficient and effective solutions to complex problems.
This book constitutes the thoroughly refereed conference proceedings of the Third International Workshop on Data Management and Analytics for Medicine and Healthcare, DMAH 2017, in Munich, Germany, in September 2017, held in conjunction with the 43rd International Conference on Very Large Data Bases, VLDB 2017.
This 2-volume set constitutes the refereed proceedings of 1st International Conference on Robotics and Rehabilitation Intelligence, ICRRI 2020, held in Fushun, China, in September 2020.
The Workshop on Self-sustaining Systems (S3) is a forum for the discussion of topics relating to computer systems and languages that are able to bootstrap, implement, modify, and maintain themselves.
This 2-volume set constitutes the refereed proceedings of 1st International Conference on Robotics and Rehabilitation Intelligence, ICRRI 2020, held in Fushun, China, in September 2020.
This book constitutes the refereed post-proceedings of the First International Conference and Second International Conference on Deep Learning Theory and Applications, DeLTA 2020 and DeLTA 2021, was held virtually due to the COVID-19 crisis on July 8-10, 2020 and July 7-9, 2021.
The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Mobile Networks and Management, MONAMI 2016, held in Abu Dhabi, United Arab Emirates, in October 2016.
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2020, held in November 2020.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Gerotechnology, IWoG 2019, held in Caceres, Spain, in September 2019.
Basierend auf einer Klassifikation von Client-Server-Strukturen reflektiert das Buch in systematischer Ordnung aktuelle Entwicklungstrends und notwendige Fakten der Programmierverfahren und -umgebungen für Verteilte Systeme.
This book constitutes the refereed proceedings of the 17th International Conference on Runtime Verification, RV 2017, held in Seattle, WA, USA, in September 2017.
Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutionsKey FeaturesApply threat modeling principles effectively with step-by-step instructions and support materialExplore practical strategies and solutions to address identified threats, and bolster the security of your software systemsDevelop the ability to recognize various types of threats and vulnerabilities within software systemsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAre you looking to navigate security risks, but want to make your learning experience fun?
This book constitutes the proceedings of the 30th International Workshop on Languages and Compilers for Parallel Computing, LCPC 2017, held in College Station, TX, USA, in October 2017.
This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.
This book constitutes the refereed proceedings of the 21st International Conference on Computer Aided Verification, CAV 2009, held in Grenoble, France, in June/July 2009.
This new edition of A Guide to Energy Management in Buildings begins by asking why we need to control energy use in buildings and proceeds to discuss how the energy consumption of a building can be assessed or estimated through an energy audit.
This book constitutes the proceedings of the First International Conference on Bridging the Gap between AI and Reality, AISoLA 2023, which took place in Crete, Greece, in October 2023.
This book constitutes the extended abstracts of the posters presented during the 22nd International Conference on Human-Computer Interaction, HCII 2020, which was held in July 2020.