|
|
|
|
|
Computer Viruses: from theory to applications (Collection IRIS)This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions... | | A Second Course in Formal Languages and Automata TheoryIntended for graduate students and advanced undergraduates in computer science, A Second Course in Formal Languages and Automata Theory treats topics in the theory of computation not usually covered in a first course. After a review of basic concepts, the book covers combinatorics on words, regular languages, context-free languages, parsing and... | | |
|
Models and Analysis for Distributed Systems (ISTE)
Verification and hence modeling are a mandatory but intricate problem for engineers
developing embedded distributed real-time systems that are entrusted with critical
safety applications like medical care, transportation, energy production, industrial
processes, military operations. Therefore, while emerging 40 years ago, first for... | | Mathematical Foundations of Computer Science 2013: 38th International Symposium, MFCS 2013, Klosterneuburg, Austria, August 26-30, 2013, Proceedings
This book constitutes the thoroughly refereed conference proceedings of the 38th International Symposium on Mathematical Foundations of Computer Science, MFCS 2013, held in Klosterneuburg, Austria, in August 2013. The 67 revised full papers presented together with six invited talks were carefully selected from 191 submissions. Topics covered... | | |
|
| | | | Real-Time Systems: Formal Specification and Automatic VerificationReal-time systems need to react to certain input stimuli within given time bounds. For example, an airbag in a car has to unfold within 300 milliseconds in a crash. There are many embedded safety-critical applications and each requires real-time specification techniques. This text introduces three of these techniques, based on logic and automata:... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |