| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465867103316 |
|
|
Titolo |
Formal Methods for Components and Objects [[electronic resource] ] : Third International Symposium, FMCO 2004, Leiden, The Netherlands, November 2-5, 2004, Revised Lectures / / edited by Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, Willem-Paul de Roever |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
|
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2005.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (VIII, 328 p.) |
|
|
|
|
|
|
Collana |
|
Programming and Software Engineering ; ; 3657 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Software engineering |
Programming languages (Electronic computers) |
Computer logic |
Operating systems (Computers) |
Software Engineering/Programming and Operating Systems |
Software Engineering |
Programming Languages, Compilers, Interpreters |
Logics and Meanings of Programs |
Operating Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
A Theory of Predicate-Complete Test Coverage and Generation -- A Perspective on Component Refinement -- A Fully Abstract Semantics for UML Components -- From (Meta) Objects to Aspects: A Java and AspectJ Point of View -- MoMo: A Modal Logic for Reasoning About Mobility -- Probabilistic Linda-Based Coordination Languages -- Games with Secure Equilibria, -- Priced Timed Automata: Algorithms and Applications -- rCOS: Refinement of Component and Object Systems -- Program Generation and Components -- Assertion-Based Encapsulation, Object Invariants and Simulations -- A Dynamic Binding Strategy for Multiple Inheritance and Asynchronously Communicating Objects -- Observability, Connectivity, and Replay in a Sequential Calculus of Classes -- Timing Analysis and Timing Predictability. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Formal methods have been applied successfully to the verification of medium-sized programs in protocol and hardware design. However, their application to the development of large systems requires more emphasis on specification, modelling and validation techniques supporting the concepts of reusability and modifiability, and their implementation in new extensions of existing programming languages. This book presents revised tutorial lectures given by invited speakers at the Third International Symposium on Formal Methods for Components and Objects, FMCO 2004, held in Leiden, The Netherlands, in November 2004. The 14 revised lectures by leading researchers present a comprehensive account of the potential of formal methods applied to large and complex software systems such as component-based systems and object systems. The book provides an unique combination of ideas on software engineering and formal methods that reflect the expanding body of knowledge on modern software systems. |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910542331703321 |
|
|
Titolo |
Aid and authoritarianism in Africa : development without democracy / / edited by Tobias Hagmann and Filip Reyntjens |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, England : , : Zed Books, , 2016 |
|
[London, England] : , : Bloomsbury Publishing, , 2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-350-21836-7 |
1-78360-630-4 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (193 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Economic assistance - Political aspects - Africa |
Economic assistance - Moral and ethical aspects |
Authoritarianism - Africa |
Political ideologies |
Africa Politics and government 1960- |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Introduction : aid and authoritarianism in sub-Saharan Africa after 1990 / Tobias Hagmann and Filip Reyntjens -- Discourses of democracy, practices of autocracy : shifting meanings of democracy in the aid-authoritarianism nexus / Rita Abrahamsen -- Aid to Rwanda : unstoppable rock, immovable post / Zoë Marriage -- Authoritarianism and the securitization of development in Uganda / David M. Anderson and Jonathan Fisher -- Ethiopia and international aid : development between high modernism and exceptional measures / Emanuele Fantini and Luca Puddu -- Donors and the making of 'credible' elections in Cameroon / Marie-Emmanuelle Pommerolle -- Foreign aid and political settlements : contrasting the Mozambican and Angolan cases / Helena Pérez Niño and Philippe Le Billon -- Conclusion : democracy fatigue and the ghost of modernization theory / Nicolas van de Walle. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
A revealing and urgent insight into the motives, dynamics and consequences of the increasing amounts of development aid given by the West to authoritarian governments in Africa. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910136414203321 |
|
|
Autore |
Ghinita Gabriel |
|
|
Titolo |
2015 International Workshop on Secure Internet of Things : SIoT 2015 : 21-25 September 2015, Vienna, Austria : proceedings / / Gabriel Ghinita, Pedro Peris-Lopez |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Piscataway, New Jersey : , : IEEE, , [2015] |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (ix, 83 pages) : illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Internet - Security measures |
Internet of things |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Session 1: Security and Privacy -- Session 2: Secure Protocols -- Session 3: Users and Privacy -- Session 4: Security Attacks and Threats -- Author Index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The workshop will focus on contributions related to the security of mesh and machine to machine networks, secure software stacks running on ubiquitous network nodes, and algorithms used to provide secure end to end communication between nodes. |
|
|
|
|
|
|
|
| |