01236nam0 2200313 450 00004002220150108114341.0978-88-7814-429-320150108d2010----km-y0itaa50------baitaITPensare/Classificarestudi e ricerche sulla ceramica medievale per Graziella Bertia cura di Sauro Gelichi e Monica BaldassarriBorgo San Lorenzo (FI)All'Insegna del Giglio2010200 p., [4] carte di tav.ill.29 cmRicerche di archeologia altomedievale e medievale372001Ricerche di archeologia altomedievale e medievale37CeramicaMedioevoScritti in onore738.309(22. ed.)Terraglia e gres. StoriaGelichi,SauroBaldassarri,MonicaITUniversità della Basilicata - B.I.A.REICATunimarc000040022Pensare105134UNIBASLETTEREEXT0170120150108BAS010950EXT0170120150108BAS011143BAS01BAS01BOOKBASA4Polo di MateraDIDDidatticaMSR/113070113070L1130702015010804Prestabile Didattica06810nam 22007455 450 99646570820331620200703120357.03-540-45319-910.1007/3-540-45319-9(CKB)1000000000211471(SSID)ssj0000327271(PQKBManifestationID)11230134(PQKBTitleCode)TC0000327271(PQKBWorkID)10301598(PQKB)11711312(DE-He213)978-3-540-45319-2(MiAaPQ)EBC3071679(PPN)155172735(EXLCZ)99100000000021147120121227d2001 u| 0engurnn#008mamaatxtccrTools and Algorithms for the Construction and Analysis of Systems[electronic resource] 7th International Conference, TACAS 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6, 2001 Proceedings /edited by Tiziana Margaria, Wang Yi1st ed. 2001.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2001.1 online resource (XIV, 594 p.)Lecture Notes in Computer Science,0302-9743 ;2031Bibliographic Level Mode of Issuance: Monograph3-540-41865-2 Includes bibliographical references and index.Invited Contributions -- Branching vs. Linear Time: Final Showdown -- Propositional Reasoning -- Symbolic Verification -- Language Containment Checking with Nondeterministic BDDs -- Satisfiability Checking Using Boolean Expression Diagrams -- A Library for Composite Symbolic Representations -- Infinite State Systems: Deduction and Abstraction -- Synthesis of Linear Ranking Functions -- Automatic Deductive Verification with Invisible Invariants -- Incremental Verification by Abstraction -- A Technique for Invariant Generation -- Application of Model Checking Techniques -- Model Checking Syllabi and Student Careers -- Verification of Vortex Workflows -- Parameterized Verification of Multithreaded Software Libraries -- Timed and Probabilistic Systems -- Efficient Guiding Towards Cost-Optimality in UPPAAL -- Linear Parametric Model Checking of Timed Automata -- Abstraction in Probabilistic Process Algebra -- First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders -- Hardware: Design and Verification -- Hardware/Software Co-design Using Functional Languages -- Automatic Abstraction of Memories in the Formal Verification of Superscalar Microprocessors -- Software Verification -- Boolean and Cartesian Abstraction for Model Checking C Programs -- Finding Feasible Counter-examples when Model Checking Abstracted Java Programs -- The loop Compiler for Java and JML -- Symbolic Verification -- Searching Powerset Automata by Combining Explicit-State and Symbolic Model Checking -- Saturation: An Efficient Iteration Strategy for Symbolic State—Space Generation -- Testing: Techniques and Tools -- Automated Test Generation from Timed Automata -- Testing an Intentional Naming Scheme Using Genetic Algorithms -- Building a Tool for the Analysis and Testing of Web Applications: Problems and Solutions -- TATOO: Testing and Analysis Tool for Object-Oriented Software -- Implementation Techniques -- Implementing a Multi-valued Symbolic Model Checker -- Is There a Best Symbolic Cycle-Detection Algorithm? -- Combining Structural and Enumerative Techniques for the Validation of Bounded Petri Nets -- A Sweep-Line Method for State Space Exploration -- Semantics and Compositional Verification -- Assume-Guarantee Based Compositional Reasoning for Synchronous Timing Diagrams -- Simulation Revisited -- Compositional Message Sequence Charts -- An Automata Based Interpretation of Live Sequence Charts -- Logics and Model-Checking -- Coverage Metrics for Temporal Logic Model Checking -- Parallel Model Checking for the Alternation Free ?-Calculus -- Model Checking CTL*[DC] -- ETAPS Tool Demonstration -- CPN/Tools: A Tool for Editing and Simulating Coloured Petri Nets ETAPS Tool Demonstration Related to TACAS -- The ASM Workbench: A Tool Environment for Computer-Aided Analysis and Validation of Abstract State Machine Models -- The Erlang Verification Tool.This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on symbolic verification, infinite state systems - deduction and abstraction, application of model checking techniques, timed and probabilistic systems, hardware - design and verification, software verification, testing - techniques and tools, implementation techniques, semantics and compositional verification, logics and model checking, and ETAPS tool demonstration.Lecture Notes in Computer Science,0302-9743 ;2031Software engineeringComputer logicComputer communication systemsAlgorithmsSoftware Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Logics and Meanings of Programshttps://scigraph.springernature.com/ontologies/product-market-codes/I1603XSoftware Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Software engineering.Computer logic.Computer communication systems.Algorithms.Software Engineering/Programming and Operating Systems.Logics and Meanings of Programs.Software Engineering.Computer Communication Networks.Algorithm Analysis and Problem Complexity.004.2/11Margaria Tizianaedthttp://id.loc.gov/vocabulary/relators/edtYi Wangedthttp://id.loc.gov/vocabulary/relators/edtETAPS (Conference)(4th :2001 :Genoa, Italy),MiAaPQMiAaPQMiAaPQBOOK996465708203316Tools and Algorithms for the Construction and Analysis of Systems772021UNISA04056nam 22006735 450 991029981660332120250829094806.03-319-18302-810.1007/978-3-319-18302-2(CKB)3710000000416825(EBL)2096848(SSID)ssj0001501176(PQKBManifestationID)11848538(PQKBTitleCode)TC0001501176(PQKBWorkID)11522338(PQKB)11286978(DE-He213)978-3-319-18302-2(MiAaPQ)EBC2096848(PPN)186030436(EXLCZ)99371000000041682520150530d2015 u| 0engur|n|---|||||txtccrCyber Security: Analytics, Technology and Automation /edited by Martti Lehto, Pekka Neittaanmäki1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (268 p.)Intelligent Systems, Control and Automation: Science and Engineering,2213-8994 ;78Description based upon print version of record.3-319-18301-X Includes bibliographical references.Part I Cyber World Today -- 1 Phenomenon in the Cyber World -- 2 Cyber World as a Social System -- 3 Citizens in Cyber World – Despatches from the Virtual "Clinic" -- 4 Powers and Fundamental Rights in Cyber Security -- Part II: Cyber Security Threats, Legality and Strategy -- 1 Coder, Hacker, Soldier, Spy -- 2 Cyber Warfare -- 3 Deception in the Cyber-World -- 4 Legal Framework of Cyber Security -- 5 Finnish Cyber Security Strategy and Implementation -- Part III Cyber Security Technology -- 1 Clustering-Based Protocol Classification via Dimensionality Reduction -- 2 Timing and Side Channel Attacks -- 3 Knowledge Discovery from Network Logs -- 4 Trusted Computing and DRM -- Part IV Cyber Security and Automation -- 1 Cyber Security and Protection of ICS Systems: An Australian Example -- 2 Towards Dependable Automation -- 3 Specialized Honeypots for SCADA Systems.Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.Intelligent Systems, Control and Automation: Science and Engineering,2213-8994 ;78Data protectionTelecommunicationSecurity systemsData and Information SecurityCommunications Engineering, NetworksSecurity Science and TechnologyData protection.Telecommunication.Security systems.Data and Information Security.Communications Engineering, Networks.Security Science and Technology.004005.8621.382621.389Lehto Marttiedthttp://id.loc.gov/vocabulary/relators/edtNeittaanmäki Pekkaedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910299816603321Cyber Security: Analytics, Technology and Automation1412297UNINA