Verification and Evaluation of Computer and Communication Systems - Ben Hedia, Belgacem; Ghazel, Mohamed; Monsuez, Bruno; (ed.) - Prospero Internet Bookshop

 
Product details:

ISBN13:9783031853555
ISBN10:3031853555
Binding:Paperback
No. of pages:245 pages
Size:235x155 mm
Language:English
Illustrations: 92 Illustrations, black & white
700
Category:

Verification and Evaluation of Computer and Communication Systems

17th International Conference, VECoS 2024, Djerba, Tunisia, October 16?18, 2024, Proceedings
 
Publisher: Springer
Date of Publication:
Number of Volumes: 1 pieces, Book
 
Normal price:

Publisher's listprice:
EUR 62.05
Estimated price in HUF:
26 321 HUF (25 068 HUF + 5% VAT)
Why estimated?
 
Your price:

24 216 (23 063 HUF + 5% VAT )
discount is: 8% (approx 2 106 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Long description:

This book constitutes the refereed proceedings of the 17th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2024, held in Djerba, Tunisia, during October 16?18, 2024.



The 16 full papers included in this book were carefully reviewed and selected from 42 submissions. They deal with the state of the art and challenges in modern computer and communication systems in the areas of verification, control, performance, and dependability evaluation. 

Table of Contents:

.- Formal Verification of Coupled Transmission Lines using Theorem Proving.
.- Optimizing Label Coverage using Regular Expression-Based Linear Programming.
.- Formal Verification of Declarative Specifications of BPs: DCR2CPN based Approach.
.- Toward Green Data Lake Management and Analysis through a CTMC Model.
.- A High Parallelization Method for Automated Formal Verification of Deep Neural Networks.
.- Monitoring of Neural Network Classifiers using Neuron Activation Paths.
.- Formal Security Analysis of Deep Neural Network Architecture.
.- Intrusion Detection using an enhancement Bi-LSTM Recurrent Neural Network model.
.- A Formal Approach for Verifying and Validating Security Objectives in Software Architecture.
.- Supervisory Control of Cyber-Physical Systems Using Labeled Petri Nets Under Sensor and Actuator Attacks.
.- ERTMS/ETCS L3: Usable Formal Models for the “Loss of Train Integrity” Operation Scenario.
.- Towards a Model for Energy-Efficient and Flexible IoT Systems.
.- Integrating SysML and Timed Reo to Model and Verify Cyber-Physical Systems Interactions with Timing Constraints.
.- A Reliable and Resource-Aware Federated Learning Solution by Decentralizing Client Selection for IoT Devices.
.- DRL based SFC Orchestration in SDN/NFV Environments subject to Transient Unavailability.