LEADER 05850nam 22006973 450 001 9911006713003321 005 20251218010127.0 010 $a9780128023402 010 $a0128023406 010 $a9780128021323 010 $a0128021322 035 $a(CKB)3710000000430794 035 $a(EBL)2072012 035 $a(SSID)ssj0001611255 035 $a(PQKBManifestationID)16322986 035 $a(PQKBTitleCode)TC0001611255 035 $a(PQKBWorkID)14900333 035 $a(PQKB)11632747 035 $a(WaSeSS)IndRDA00069977 035 $a(OCoLC)915143486 035 $a(OCoLC)ocn915143486 035 $a(FR-PaCSA)88829552 035 $a(CaSebORM)9780128023402 035 $a(MiAaPQ)EBC2072012 035 $a(FRCYB88829552)88829552 035 $a(EXLCZ)993710000000430794 100 $a20150629d2015|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in computers$hVolume 98 /$fEdited by Ali R. Hurson 205 $aFirst edition. 210 1$aAmsterdam, Netherlands :$cElsevier,$d2015. 215 $a1 online resource (247 p.) 225 1 $aAdvances in computers,$x0065-2458 ;$vv. 98 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references and indexes. 327 $aChapter 1: An Overview of Architecture-Level Power-and Energy-Efficient Design Techniques -- 1. Introduction -- 2. Metrics of Interest -- 3. Classification of Selected Architecture-Level Techniques -- 4. Presentation of Selected Architecture-Level Techniques -- 5. Future Trend -- 6. Conclusion -- References -- 327 $aChapter 2: A Survey of Research on Data Corruption in Cyber-Physical Critical Infrastructure Systems -- 1. Introduction -- 2. Sources of Corrupted Data -- 3. Sensor Networks: Application for Comparison -- 4. Detection of Corrupted Data -- 5. Mitigation of Data Corruption -- 6. Propagation of Corrupted Data -- 7. Conclusion and Future Direction -- References -- 327 $aChapter 3: A Research Overview of Tool-Supported Model-based Testing of Requirements-based Designs -- 1. Introduction -- 2. The Generic Model-based Testing Approach -- 3. Proposed Taxonomy Dimensions -- 4. A Research Review of Model-based Testing Tools -- 5. Running Example: The Coffee/Tea Vending Machine -- 6. Model-based Testing Tools for Pre/Post Notations -- 7. Model-based Testing Tools for Transition-based Notations -- 7.1. Finite State Machines -- 327 $aChapter 4: Preference Incorporation in Evolutionary Multiobjective Optimization: A Survey of the State-of-the-Art -- Index. 330 $aThe theme of this 98th volume is inspired by the advances in information technology. Within the spectrum of information technology, this volume touches a variety of topics ranging from computer architecture and energy-efficient design techniques, cyber-physical critical infrastructure systems, model-based testing, and multi-objective optimization methods. The volume is a collection of four chapters that were solicited from authorities in the field, each of whom brings to bear a unique perspective on the topic. (1) Architecture-Level Power- and Energy-Efficient Design Techniques, articulate the holistic consideration of power and energy consumption of computer systems at all design levels without sacrificing the processing power. Several circuit and architectural metrics are defined, the notion of dynamic and static energy is discussed, distinction between power and energy is articulated, and metrics such as ?Energy-Delay Product? and ?Energy per Instruction? are introduced. (2) Data Corruption in Cyber-Physical Critical Infrastructure Systems, and emphasizes the effect of data corruption, either intentional (i.e., cyber, physical, or cyber-physical attacks) or unintentional (i.e., failures in sensors, processors, storage, or communication hardware), within the scope of critical cyber-physical systems (i.e., power grids, intelligent water distribution networks, smart transportation systems). It presents a comprehensive analysis of various data corruption and mitigation techniques. Finally, a number of studies on the negative effects of system execution on corrupted data are presented. (3) Tool-Supported Model-Based Testing of Requirements-Based Designs, address software testing objectives as a means to gain confidence in software products through fault detection, by observing the differences between the behavior of the implementation and the expected behavior described in the specification. The Chapter presents an overview of and classifies the state of the art in tool-supported model-based testing with an eye toward gaining insight into the gaps in the current tools used by industry and academia. (4) "Preference Incorporation in Evolutionary Multiobjective Optimization" presents a survey of the "State of the Art" and emphasizes the application of evolutionary algorithms as a means for multi-objective optimization. A classification of preference-based Multiobjective Optimization Evolutionary Algorithms based on the structure of the decision maker's preference information is presented and several approaches are discussed and analyzed. 410 0$aAdvances in computers ;$vv. 98$w(OCoLC)1461174$x0065-2458 606 $aComputers 606 $aGraphical user interfaces (Computer systems) 606 $aSystem analysis 615 4$aComputers. 615 4$aGraphical user interfaces (Computer systems). 615 4$aSystem analysis. 676 $a005.12 702 $aHurson$b A. R 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 801 2$bNZ-WeVUL 906 $aBOOK 912 $a9911006713003321 996 $aAdvances in Computers$94391811 997 $aUNINA