Muutke küpsiste eelistusi

Verification and Evaluation of Computer and Communication Systems: 17th International Conference, VECoS 2024, Djerba, Tunisia, October 1618, 2024, Proceedings [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 250 pages, kõrgus x laius: 235x155 mm, 88 Illustrations, color; 20 Illustrations, black and white; XVIII, 250 p. 108 illus., 88 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 15466
  • Ilmumisaeg: 17-Apr-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031853555
  • ISBN-13: 9783031853555
  • Pehme köide
  • Hind: 56,11 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 66,01 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 250 pages, kõrgus x laius: 235x155 mm, 88 Illustrations, color; 20 Illustrations, black and white; XVIII, 250 p. 108 illus., 88 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 15466
  • Ilmumisaeg: 17-Apr-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031853555
  • ISBN-13: 9783031853555
This book constitutes the refereed proceedings of the 17th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2024, held in Djerba, Tunisia, during October 1618, 2024.





The 16 full papers included in this book were carefully reviewed and selected from 42 submissions. They deal with the state of the art and challenges in modern computer and communication systems in the areas of verification, control, performance, and dependability evaluation. 
.- Formal Verification of Coupled Transmission Lines using Theorem
Proving.
.- Optimizing Label Coverage using Regular Expression-Based Linear
Programming.
.- Formal Verification of Declarative Specifications of BPs: DCR2CPN based
Approach.
.- Toward Green Data Lake Management and Analysis through a CTMC Model.
.- A High Parallelization Method for Automated Formal Verification of Deep
Neural Networks.
.- Monitoring of Neural Network Classifiers using Neuron Activation Paths.
.- Formal Security Analysis of Deep Neural Network Architecture.
.- Intrusion Detection using an enhancement Bi-LSTM Recurrent Neural Network
model.
.- A Formal Approach for Verifying and Validating Security Objectives in
Software Architecture.
.- Supervisory Control of Cyber-Physical Systems Using Labeled Petri Nets
Under Sensor and Actuator Attacks.
.- ERTMS/ETCS L3: Usable Formal Models for the Loss of Train Integrity
Operation Scenario.
.- Towards a Model for Energy-Efficient and Flexible IoT Systems.
.- Integrating SysML and Timed Reo to Model and Verify Cyber-Physical Systems
Interactions with Timing Constraints.
.- A Reliable and Resource-Aware Federated Learning Solution by
Decentralizing Client Selection for IoT Devices.
.- DRL based SFC Orchestration in SDN/NFV Environments subject to Transient
Unavailability.