Résultats de recherche de titre
Articles 61 à 80 sur 2568
Technologieinduzierte Entwicklung neuer Wertversprechen im Software-intensive Business
Par Felix Schönhofen. 2023
Die Digitalisierung der meisten Branchen spiegelt sich in einem wachsenden Anteil der Software an der Gesamtwertschöpfung wider. Unternehmen eröffnen sich…
dadurch neue Möglichkeiten für technologische Innovationen. Gleichzeitig stehen sie aber vor der ständigen Herausforderung, diese Innovationen in Produkte zu überführen, die für den Kunden wertstiftend sind. Dieser Problemstellung widmeten sich bereits eine Reihe an Methoden zur Produkt- und Geschäftsmodellinnovation, die Überführung der hier gewonnenen Erkenntnisse in die konkrete Produktgestaltung bleibt jedoch eine Herausforderung.Genau hier setzt diese Arbeit an, indem sie die methodische Vorgehensweise „Value Proposition Deployment“ vorschlägt, mit der Unternehmen auf Basis technologischer Innovationen neue Wertversprechen entwickeln können. Hierzu verbindet das Value Proposition Deployment Erkenntnisse des Innovationsmanagements mit Methoden der konstruktiven Qualitätssicherung und stellt somit eine Brücke zwischen Innovations- und Qualitätsmanagement dar. Die auf Basis von 15 praxisrelevanten Gestaltungsanforderungen entwickelte Methode wird detailliert erläutert und anhand praxisnaher Fallbeispiele beschrieben.Formal Methods for Industrial Critical Systems: 25th International Conference, FMICS 2020, Vienna, Austria, September 2–3, 2020, Proceedings (Lecture Notes in Computer Science #12327)
Par Maurice H. ter Beek, Dejan Ničković. 2020
This book constitutes the proceedings of the 25th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2020, which…
was held during September 2-3, 2020. The conference was planned to take place in Vienna, Austria. Due to the COVID-19 pandemic it changed to a virtual event.The 11 full papers presented in this volume were carefully reviewed and selected from 26 submissions. The papers are organized in topical sections as follows: Quantitative Analysis and Cyber-Physical Systems, Formal Verification of Industrial Systems, Temporal Logic and Model Checking. The book also contains a lengthy report on a Formal Methods Survey conducted on occasion of the 25th edition of the conference.Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers (Lecture Notes in Comput
Par Sokratis Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla. 2023
This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with the 27th European Symposium…
on Research in Computer Security, ESORICS 2022, held in hybrid mode, in Copenhagen, Denmark, during September 26-30, 2022. The 39 papers included in these proceedings stem from the following workshops: 8th Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2022, which accepted 8 papers from 15 submissions; 6th International Workshop on Security and Privacy Requirements Engineering, SECPRE 2022, which accepted 2 papers from 5 submissions; Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, which accepted 4 full papers out of 13 submissions; Third Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2022, which accepted 9 full and 1 short paper out of 19 submissions; Second International Workshop on Cyber Defence Technologies and Secure Communications at the Network Edge, CDT & SECOMANE 2022, which accepted 5 papers out of 8 submissions; First International Workshop on Election Infrastructure Security, EIS 2022, which accepted 5 papers out of 10 submissions; and First International Workshop on System Security Assurance, SecAssure 2022, which accepted 5 papers out of 10 submissions.Segmentation of the Aorta. Towards the Automatic Segmentation, Modeling, and Meshing of the Aortic Vessel Tree from Multicenter Acquisition: First Challenge, SEG.A. 2023, Held in Conjunction with MICCAI 2023, Vancouver, BC, Canada, October 8, 2023, Procee
Par Antonio Pepe, Gian Marco Melito, Jan Egger. 2024
This book constitutes the First Segmentation of the Aorta Challenge, SEG.A. 2023, which was held in conjunction with the 26th…
International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2023, on October 8, 2023. The 8 full and 3 short papers presented have been carefully reviewed and selected for inclusion in the book. They focus specifically on robustness, visual quality and meshing of automatically generated segmentations of aortic vessel trees from CT imaging. The challenge was organized as a ”container submission” challenge, where participants had to upload their algorithms to Grand Challenge in the form of Docker containers. Three tasks were created for SEG.A. 2023.This book constitutes revised papers from the International Workshops held at the 21st International Conference on Business Process Management, BPM…
2023, in Utrecht, The Netherlands, during September 2023.Papers from the following workshops are included:• 7th International Workshop on Artificial Intelligence for Business Process Management (AI4BPM 2023)• 7th International Workshop on Business Processes Meet Internet-of-Things (BP-Meet-IoT 2023)• 19th International Workshop on Business Process Intelligence (BPI 2023)• 16th International Workshop on Social and Human Aspects of Business Process Management (BPMS2 2023)• 2nd International Workshop on Data-Driven Business Process Optimization (BPO 2023)• 11th International Workshop on Declarative, Decision and Hybrid Approaches to Processes (DEC2H 2023)• 1st International Workshop on Digital Twins for Business Processes (DT4BP 2023)• 1st International Workshop on Formal Methods for Business Process Management (FM-BPM 2023) • 2nd International Workshop on Natural Language Processing for Business Process Management (NLP4BPM 2023)• 1st International Workshop on Object-Centric Processes from A to Z (OBJECTS 2023)• 3rd International Workshop on Change, Drift, and Dynamics of Organizational Processes (ProDy 2023) Each of the workshops focused on particular aspects of business process management. Overall, after a thorough review process, 42 full papers were selected from a total of 86 submissions.Transactions on Intelligent Welding Manufacturing: Volume V No. 1 2021 (Transactions on Intelligent Welding Manufacturing)
Par Shanben Chen, Yuming Zhang, Zhili Feng. 2024
The primary aim of this book is to provide researchers and engineers from both academic and industry with up-to-date coverage…
of new results in the field of robotic welding, intelligent systems and automation. The book is mainly based on papers selected from the 2022 International Conference on Robotic Welding, Intelligence and Automation (RWIA’2022) in Shanghai and Lanzhou, China. The articles show that the intelligentized welding manufacturing (IWM) is becoming an inevitable trend with the intelligentized robotic welding as the key technology. The volume is divided into four logical parts: Intelligent Techniques for Robotic Welding, Sensing of Arc Welding Processing, Modeling and Intelligent Control of Welding Processing, as well as Intelligent Control and its Applications in Engineering.Edge Intelligent Computing Systems in Different Domains (SpringerBriefs in Computer Science)
Par Benedetta Picano, Romano Fantacci. 2024
This book provides a comprehensive and systematic exploration of next-generation Edge Intelligence (EI) Networks. It delves deep into the critical…
design considerations within this context, emphasizing the necessity for functional and dependable interactions between networking strategies and the diverse application scenarios. This should help assist to encompass a wide range of environments.This book also discusses topics such as resource optimization, incentive mechanisms, channel prediction and cutting-edge technologies, which includes digital twins and advanced machine learning techniques. It underscores the importance of functional integration to facilitate meaningful collaborations between networks and systems, while operating across heterogeneous environments aiming support novel and disruptive human-oriented services and applications. Valuable insights into the stringent requirements for intelligence capabilities, communication latency and real-time response are discussed. This characterizes the new EI era, driving the creation of comprehensive cross-domain architectural ecosystems that infuse human-like intelligence into every aspect of emerging EI systems.This book primarily targets advanced-level students as well as postdoctoral researchers, who are new to this field and are searching for a comprehensive understanding of emerging EI systems. Practitioners seeking guidance in the development and implementation of EI systems in practical contexts will also benefit from this book.Development and Testing of Vehicle Software and its Influence on Sustainable Transport
Par Antonio Colmenar-Santos, David Borge-Diez, Pedro-Miguel Ortega-Cabezas. 2024
This book evaluates the contributions of the electronic control unit software of an electric vehicle on sustainability and society, such…
as the reduction of emissions during a product design and the improvements in the vehicle. A sustainable transport model is proposed, demonstrating its economic viability. By validating software in a more efficient way and adding new functionalities to the software to enhance driving efficiency, energy consumption can be significantly reduced. Therefore, software validation and development have a significant impact on sustainability. This book offers innovative validation solutions based on artificial intelligence techniques to reduce validation time and emissions. The impact of driving efficiency on sustainable transport models is studied in detail, making proposals to be considered in the current environmental policies under discussion within the European Union in order to improve the sustainability of transport models. Vehicles are becoming sophisticated electronic systems due to the fact that they are integrating a significant number of electronic control units. This trend will certainly continue in the year to come. Consequently, software validation techniques are a key element for car manufacturers in order to ensure the quality of the vehicle. This book contributes to these efforts.Statistics and Data Analysis for Engineers and Scientists (Transactions on Computer Systems and Networks)
Par Tanvir Mustafy, Md. Tauhid Rahman. 2024
This textbook summarizes the different statistical, scientific, and financial data analysis methods for users ranging from a high school level…
to a professional level. It aims to combine the data analysis methods using three different programs—Microsoft Excel, SPSS, and MATLAB. The book combining the different data analysis tools is a unique approach. The book presents a variety of real-life problems in data analysis and machine learning, delivering the best solution. Analysis methods presented in this book include but are not limited to, performing various algebraic and trigonometric operations, regression modeling, and correlation, as well as plotting graphs and charts to represent the results. Fundamental concepts of applied statistics are also explained here, with illustrative examples. Thus, this book presents a pioneering solution to help a wide range of students, researchers, and professionals learn data processing, interpret different findings derived from the analyses, and apply them to their research or professional fields. The book also includes worked examples of practical problems. The primary focus behind designing these examples is understanding the concepts of data analysis and how it can solve problems. The chapters include practice exercises to assist users in enhancing their skills to execute statistical analysis calculations using software instead of relying on tables for probabilities and percentiles in the present world.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.The two-volume set LNCS 14461 and LNCS 14462 constitutes the refereed proceedings of the 17th International Conference on Combinatorial Optimization and Applications, COCOA 2023, held…
in Hawaii, HI, USA, during December 15–17, 2023. The 73 full papers included in the proceedings were carefully reviewed and selected from 117 submissions. They were organized in topical sections as follows: Part I: Optimization in graphs; scheduling; set-related optimization; applied optimization and algorithm; Graph planer and others;Part II: Modeling and algorithms; complexity and approximation; combinatorics and computing; optimization and algorithms; extreme graph and others; machine learning, blockchain and others.Take Control of the Mac Command Line with Terminal
Par Joe Kissell. 2022
Release your inner geek and harness the power of the Unix underpinnings to Mac OS X! This ebook from Joe…
Kissell explains everything you need to know to become comfortable working on the command line in Terminal, and provides numerous "recipes" for performing useful tasks.Conversational Artificial Intelligence
Par Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Piyush Vyas, Mary Sowjanya Alamanda, Kotagiri Srividya, Krishnan Sakthidasan Sankaran. 2024
Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system…
to help customers through either a spoken or typed interface. Conversational chatbots that respond to questions promptly and accurately to help customers are a fascinating development since they make the customer service industry somewhat self-sufficient. A well-automated chatbot can decimate staffing needs, but creating one is a time-consuming process. Voice recognition technologies are becoming more critical as AI assistants like Alexa become more popular. Chatbots in the corporate world have advanced technical connections with clients thanks to improvements in artificial intelligence. However, these chatbots’ increased access to sensitive information has raised serious security concerns. Threats are one-time events such as malware and DDOS (Distributed Denial of Service) assaults. Targeted strikes on companies are familiar and frequently lock workers out. User privacy violations are becoming more common, emphasizing the dangers of employing chatbots. Vulnerabilities are systemic problems that enable thieves to break in. Vulnerabilities allow threats to enter the system, hence they are inextricably linked. Malicious chatbots are widely used to spam and advertise in chat rooms by imitating human behavior and discussions, or to trick individuals into disclosing personal information like bank account details.AI for Radiology (AI for Everything)
Par Oge Marques. 2024
Artificial intelligence (AI) has revolutionized many areas of medicine and is increasingly being embraced. This book focuses on the integral…
role of AI in radiology, shedding light on how this technology can enhance patient care and streamline professional workflows. This book reviews, explains, and contextualizes some of the most current, practical, and relevant developments in artificial intelligence and deep learning in radiology and medical image analysis. AI for Radiology presents a balanced viewpoint of the impact of AI in these fields, underscoring that AI technologies are not intended to replace radiologists but rather to augment their capabilities, freeing professionals to focus on more complex cases. This book guides readers from the basic principles of AI to their practical applications in radiology, moving from the role of data in AI to the ethical and regulatory considerations of using AI in radiology and concluding with a selection of resources for further exploration. This book has been crafted with a diverse readership in mind. It is a valuable asset for medical professionals eager to stay up to date with AI developments, computer scientists curious about AI’s clinical applications, and anyone interested in the intersection of healthcare and technology.Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14344)
Par Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis. 2024
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS…
2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.This two-volume set LNCS 14465-14466 constitutes the proceedings of the 31st International Symposium on Graph Drawing and Network Visualization, GD…
2023, held in Isola delle Femmine, Palermo, Italy, in September 2023. The 31 full papers, 7 short papers, presented together with 2 invited talks, and one contest report, were thoroughly reviewed and selected from the 100 submissions. The abstracts of 11 posters presented at the conference can be found in the back matter of the volume. The contributions were organized in topical sections as follows: beyond planarity; crossing numbers; linear layouts; geometric aspects; visualization challenges; graph representations; graph decompositions; topological aspects; parameterized complexity for drawings; planar graphs; frameworks; algorithmics.Pen Testing from Contract to Report
Par Alfred Basta, Nadine Basta, Waqar Anwar. 2024
Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as…
‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. In Pen Testing from Contract to Report readers will also find: Content mapped to certification exams such as the CompTIA PenTest+Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and moreAccompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.Becoming SRE
Par David N. Blank-Edelman. 2024
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk…
you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs and more with three interconnected sections: the essential groundwork for understanding SRE and SRE culture, advice for individuals on becoming an SRE, and guidance for organizations on creating and developing a thriving SRE practice. Acting as your personal and personable guide, author David Blank-Edelman takes you through subjects like: SRE mindset, SRE culture, and SRE advocacyWhat you need to get started and hired in SRE and what the job will be like when you get thereWhat you need to bring SRE into an organization and what is required for a good organizational fit so it can thrive thereHow to work with your business folks and management around SREHow SRE can grow and mature in an organization over time Ready to become an SRE or introduce SRE into your organization? This book is here to help.The WhatsApp India Story: Inside the Digital Maya Sphere
Par Sunetra Sen Narayan, Shalini Narayanan. 2024
WhatsApp is used by over half a billion people in India today in all fields – in business, corporate and…
informal sectors, in government, for education and among friends, families and acquaintances. This book critically explores the social messaging app’s rapid expansion in India and its growing influence and looks at whether, as a form of horizontal communication, it poses a challenge to more traditional structures of communication. The book examines WhatsApp’s spread in the personal and professional lives of Indians and the myriad ways in which people in India are using the app in social and business interactions, including among people living with disabilities. Using case studies, interviews, surveys and in-depth research, it analyses key aspects of WhatsApp’s massive popularity and its impact on how people communicate. It also explores its impact on the psycho-social dynamics in India, including the dissemination of fake news and politically motivated content, and the consequent need for media regulation in the country. One of the first books to analyse the pervasiveness of WhatsApp and social media apps in different areas of Indian society, this book will be of interest to scholars and students of media studies, communication studies, digital media, cultural studies, cyberculture studies, sociology and social policy and media law.Acing the System Design Interview
Par Zhiyong Tan. 2024
The system design interview is one of the hardest challenges you&’ll face in the software engineering hiring process. This practical…
book gives you the insights, the skills, and the hands-on practice you need to ace the toughest system design interview questions and land the job and salary you want.In Acing the System Design Interview you will master a structured and organized approach to present system design ideas like: Scaling applications to support heavy traffic Distributed transactions techniques to ensure data consistency Services for functional partitioning such as API gateway and service mesh Common API paradigms including REST, RPC, and GraphQL Caching strategies, including their tradeoffs Logging, monitoring, and alerting concepts that are critical in any system design Communication skills that demonstrate your engineering maturity Don&’t be daunted by the complex, open-ended nature of system design interviews! In this in-depth guide, author Zhiyong Tan shares what he&’s learned on both sides of the interview table. You&’ll dive deep into the common technical topics that arise during interviews and learn how to apply them to mentally perfect different kinds of systems. Foreword by Anthony Asta, Michael D. Elder. About the technology The system design interview is daunting even for seasoned software engineers. Fortunately, with a little careful prep work you can turn those open-ended questions and whiteboard sessions into your competitive advantage! In this powerful book, Zhiyong Tan reveals practical interview techniques and insights about system design that have earned developers job offers from Amazon, Apple, ByteDance, PayPal, and Uber. About the book Acing the System Design Interview is a masterclass in how to confidently nail your next interview. Following these easy-to-remember techniques, you&’ll learn to quickly assess a question, identify an advantageous approach, and then communicate your ideas clearly to an interviewer. As you work through this book, you&’ll gain not only the skills to successfully interview, but also to do the actual work of great system design. What's inside Insights on scaling, transactions, logging, and more Practice questions for core system design concepts How to demonstrate your engineering maturity Great questions to ask your interviewer About the reader For software engineers, software architects, and engineering managers looking to advance their careers. About the author Zhiyong Tan is a manager at PayPal. He has worked at Uber, Teradata, and at small startups. Over the years, he has been in many system design interviews, on both sides of the table. The technical editor on this book was Mohit Kumar. Table of Contents PART 1 1 A walkthrough of system design concepts 2 A typical system design interview flow 3 Non-functional requirements 4 Scaling databases 5 Distributed transactions 6 Common services for functional partitioning PART 2 7 Design Craigslist 8 Design a rate-limiting service 9 Design a notification/alerting service 10 Design a database batch auditing service 11 Autocomplete/typeahead 12 Design Flickr 13 Design a Content Distribution Network (CDN) 14 Design a text messaging app 15 Design Airbnb 16 Design a news feed 17 Design a dashboard of top 10 products on Amazon by sales volume Appendix A Monoliths vs. microservices Appendix B OAuth 2.0 authorization and OpenID Connect authentication Appendix C C4 Model Appendix D Two-phase commit (2PC)