LEADER 04825nam 22006375 450 001 996466102503316 005 20200706052045.0 010 $a3-540-32605-7 024 7 $a10.1007/11678779 035 $a(CKB)1000000000232840 035 $a(SSID)ssj0000318068 035 $a(PQKBManifestationID)11205744 035 $a(PQKBTitleCode)TC0000318068 035 $a(PQKBWorkID)10308778 035 $a(PQKB)10587006 035 $a(DE-He213)978-3-540-32605-2 035 $a(MiAaPQ)EBC3067660 035 $a(PPN)123131847 035 $a(EXLCZ)991000000000232840 100 $a20100715d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aHardware and Software, Verification and Testing$b[electronic resource] $eFirst International Haifa Verification Conference, Haifa, Israel, November 13-16, 2005, Revised Selected Papers /$fedited by Shmuel Ur, Eyal Bin, Yaron Wolfsthal 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (X, 270 p.) 225 1 $aProgramming and Software Engineering ;$v3875 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-32604-9 320 $aIncludes bibliographical references and index. 327 $aHardware Verification -- Path-Based System Level Stimuli Generation -- The Safety Simple Subset -- A Case for Runtime Validation of Hardware -- Assertion-Based Verification for the SpaceCAKE Multiprocessor ? A Case Study -- Simultaneous SAT-Based Model Checking of Safety Properties -- HaifaSat: A New Robust SAT Solver -- Software Testing -- Production-Testing of Embedded Systems with Aspects -- Assisting the Code Review Process Using Simple Pattern Recognition -- An Extensible Open-Source Compiler Infrastructure for Testing -- Effective Black-Box Testing with Genetic Algorithms -- Optimal Algorithmic Debugging and Reduced Coverage Using Search in Structured Domains -- Benchmarking and Testing OSD for Correctness and Compliance -- PADTAD -- A Kernel-Based Communication Fault Injector for Dependability Testing of Distributed Systems -- Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring -- Dynamic Deadlock Analysis of Multi-threaded Programs -- Verification of the Java Causality Requirements -- Choosing Among Alternative Futures. 330 $aThe First Haifa Verification Conference was held at the IBM Haifa Research Lab and at the Haifa University in Israel from November 13 to16, 2005. The conference incorporated three different workshops that took place separately in previous years. The IBM Verification Workshop is now its sixth year, the IBM Software Testing Workshop is now in its fourth year, and the PADTAD Workshop on testing and debugging multi-threaded and parallel software was held for the third time. The Verification Conference was a three-day, single-track conference followed by a one-day tutorial on the testing and review of multi-threaded code. The conference presented a unique combination of fields that brought together the hardware and software testing communities. Merging the different communities under a single roof gave the conference a distinctive flavor and provided the participants with added benefits. While the applications in these separate fields are different, the techniques used are often very similar. By offering lectures in these disparate but related disciplines, the conference engendered an environment of collaboration and discovery. 410 0$aProgramming and Software Engineering ;$v3875 606 $aSoftware engineering 606 $aComputer logic 606 $aProgramming languages (Electronic computers) 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 615 0$aSoftware engineering. 615 0$aComputer logic. 615 0$aProgramming languages (Electronic computers). 615 14$aSoftware Engineering. 615 24$aLogics and Meanings of Programs. 615 24$aProgramming Languages, Compilers, Interpreters. 676 $a005.1/4 702 $aUr$b Shmuel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBin$b Eyal$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWolfsthal$b Yaron$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466102503316 996 $aHardware and Software, Verification and Testing$9772242 997 $aUNISA LEADER 01662oam 2200457 450 001 9910707855303321 005 20170628161831.0 035 $a(CKB)5470000002468005 035 $a(OCoLC)966291349 035 $a(EXLCZ)995470000002468005 100 $a20161215g20169999 ua 0 101 0 $aeng 135 $aurbn||||a|||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Security Act of 2015 $ereport together with minority views (to accompany H.R. 2205) (including cost estimate of the Congressional Budget Office) 210 1$a[Washington, D.C.] :$c[U.S. Government Publishing Office],$d[2016]- 215 $a1 online resource (volumes) 225 1 $aRept. / 114th Congress, 2d session, House of Representatives ;$v114-867 300 $a"December 12, 2016"--Pt. 1. 517 $aData Security Act of 2015 606 $aData protection$xLaw and legislation$zUnited States 606 $aElectronic records$xLaw and legislation$zUnited States 606 $aIdentity theft$xLaw and legislation$zUnited States 606 $aDisclosure of information$xLaw and legislation$zUnited States 608 $aLegislative materials.$2lcgft 615 0$aData protection$xLaw and legislation 615 0$aElectronic records$xLaw and legislation 615 0$aIdentity theft$xLaw and legislation 615 0$aDisclosure of information$xLaw and legislation 801 0$bGPO 801 1$bGPO 801 2$bMERUC 801 2$bIOG 801 2$bHLO 801 2$bGPO 906 $aBOOK 912 $a9910707855303321 996 $aData Security Act of 2015$93488292 997 $aUNINA LEADER 03025nam 2200721 450 001 9910796532103321 005 20210416170802.0 010 $a1-78920-817-3 024 7 $a10.1515/9781785336232 035 $a(CKB)4100000000775736 035 $a(MiAaPQ)EBC4901392 035 $a(DE-B1597)636406 035 $a(DE-B1597)9781785336232 035 $a(EXLCZ)994100000000775736 100 $a20170804d2017 uy| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aFoucault's Orient $ethe conundrum of cultural difference, from Tunisia to Japan /$fMarnia Lazreg 210 1$aNew York :$cBerghahn Books,$d2017. 215 $a1 online resource (292 pages) 311 $a1-78533-623-1 311 $a1-78533-622-3 320 $aIncludes bibliographical references and index. 327 $aThe Chinese Encyclopedia and the Challenge of Difference -- Madness and Cultural Difference -- Foucault and Kant's Cosmopolitan Anthropology -- Foucault's Negative Anthropology -- Foucault's Anthropology of the Iranian Revolution -- The Heterotopia of Tunisia -- The Enigma of Japan -- Japan and Foucault's Anthropological Bind -- Epilogue. 330 $aFoucault lived in Tunisia for two years and travelled to Japan and Iran more than once. Yet throughout his critical scholarship, he insisted that the cultures of the ?Orient? constitute the ?limit? of Western rationality. Using archival research supplemented by interviews with key scholars in Tunisia, Japan and France, this book examines the philosophical sources, evolution as well as contradictions of Foucault?s experience with non-Western cultures.  Beyond tracing Foucault?s journey into the world of otherness, the book reveals the personal, political as well as methodological effects of a radical conception of cultural difference that extolled the local over the cosmopolitan. 606 $aEast and West 606 $aPhilosophical anthropology 610 $aarchival research. 610 $acontradictions. 610 $acosmopolitan. 610 $acritical scholarship. 610 $acultural difference. 610 $acultures of the orient. 610 $aevolution. 610 $afrance. 610 $airan. 610 $ajapan. 610 $akey scholars. 610 $amethodological effects. 610 $anon western cultures. 610 $apersonal. 610 $aphilosophical sources. 610 $apolitical. 610 $aradical conception. 610 $athe orient. 610 $atunisia. 610 $awestern rationality. 610 $aworld of otherness. 615 0$aEast and West. 615 0$aPhilosophical anthropology. 676 $a128 686 $aCI 5717$2rvk 700 $aLazreg$b Marnia$0611880 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910796532103321 996 $aFoucault's Orient$93835965 997 $aUNINA LEADER 04063nam 22006735 450 001 9910337574003321 005 20251225193609.0 010 $a3-030-14413-5 024 7 $a10.1007/978-3-030-14413-5 035 $a(CKB)4100000007761897 035 $a(DE-He213)978-3-030-14413-5 035 $a(MiAaPQ)EBC5924771 035 $a(PPN)235232475 035 $a(EXLCZ)994100000007761897 100 $a20190307d2019 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aQuality, Reliability, Security and Robustness in Heterogeneous Systems $e14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3?4, 2018, Proceedings /$fedited by Trung Q. Duong, Nguyen-Son Vo, Van Ca Phan 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XII, 167 p. 90 illus., 50 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v272 311 08$a3-030-14412-7 327 $aImproving Privacy for GeoIP DNS Traffic -- Deep Reinforcement Learning based QoS-aware Routing in Knowledge-defined networking -- 3 Throughput optimization for multirate multicasting through association control in IEEE 802.11 WLAN -- An NS-3 MPTCP Implementation -- A Novel Security Framework for Industrial IoT based on ISA 100.11a -- Social-aware Caching and Resource Sharing Optimization for Video Delivering in 5G Networks -- Energy Efficiency in QoS Constrained 60 GHz Millimeter-Wave Ultra-dense Networks -- Priority-based Device Discovery in Public Safety D2D Networks with Full Duplexing -- Modified Direct Method for Point-to-Point Blocking -- Probability in Multi-service Switching Networks with Resource Allocation Control -- Inconsistencies among Spectral Robustness Metrics -- QoS criteria for energy-aware switching networks -- Modelling Overflow Systems with Queuing in Primary -- Exploring YouTube?s CDN Heterogeneity. 330 $aThis book constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2018, held in Ho Chi Minh City, Vietnam, in December 2018. The 13 revised full papers were carefully reviewed and selected from 28 submissions. The papers are organized thematically in tracks, starting with security and privacy, telecommunication systems and networks, networks and applications. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v272 606 $aComputer networks 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aData protection 606 $aComputer Communication Networks 606 $aData Structures and Information Theory 606 $aMathematics of Computing 606 $aData and Information Security 615 0$aComputer networks. 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 0$aData protection. 615 14$aComputer Communication Networks. 615 24$aData Structures and Information Theory. 615 24$aMathematics of Computing. 615 24$aData and Information Security. 676 $a004.6 676 $a004.6 702 $aDuong$b Trung Q.$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVo$b Nguyen-Son$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPhan$b Van Ca$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337574003321 996 $aQuality, Reliability, Security and Robustness in Heterogeneous Systems$91902309 997 $aUNINA