LEADER 01594nam 2200385 n 450 001 996387304603316 005 20200824120549.0 035 $a(CKB)1000000000622993 035 $a(EEBO)2240863334 035 $a(UnM)99850943e 035 $a(UnM)99850943 035 $a(EXLCZ)991000000000622993 100 $a19920318d1618 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 14$aThe yonger brother his apology by it selfe. Or A fathers free power disputed$b[electronic resource] $efor the disposition of his lands, or other his fortunes to his sonne, sonnes, or any one of them: as right reason, the laws of God and nature, the ciuill, canon, and municipall lawes of this kingdome do command. By I. Ap-Robert Gent 210 $a[Saint-Omer $cEnglish College Press]$dImprinted, Anno M. DC. XVIII [1618] 215 $a[8], 62, [2] p 300 $aI. Ap-Robert = John Ap Robert. 300 $aRunning title reads: The younger brothers apology. 300 $aPlace of publication and press from STC. 300 $aThe final leaf is blank. 300 $aReproduction of the original in the Cambridge University Library. 330 $aeebo-0021 606 $aInheritance and succession$zGreat Britain$vEarly works to 1800 615 0$aInheritance and succession 700 $aJ. A$g(John Ap Robert)$01001910 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996387304603316 996 $aThe yonger brother his apology by it selfe. Or A fathers free power disputed$92405550 997 $aUNISA LEADER 01404nam a2200373 i 4500 001 991001446409707536 005 20020507193612.0 008 940711s1984 sz ||| | eng 020 $a3764315504 035 $ab10848642-39ule_inst 035 $aLE01312385$9ExL 040 $aDip.to Matematica$beng 082 0 $a003 082 0 $a515.724 084 $aAMS 47-06 084 $aAMS 47-XX 084 $aQA402 100 1 $aDym, Harry$0442082 245 10$aTopics in operator theory systems and networks :$bworkshop on Applications of Linear Operator Theory to Systems and Networks, Rehovot (Israel), June 13-16, 1983 /$ceds. H. Dym, I. Gohberg 260 $aBasel ; Boston :$bBirkhauser,$c1984 300 $a384 p. ;$c24 cm. 490 0 $aOperator theory.$pAdvances and applications ;$v12 500 $aIncludes bibliographies 650 4$aElectric network analysis$xCongresses 650 4$aLinear operators$xCongresses 650 4$aOperator theory 650 4$aSystem analysis$xCongresses 700 1 $aGohberg, Izrail TSudikovich 907 $a.b10848642$b23-02-17$c28-06-02 912 $a991001446409707536 945 $aLE013 47-XX DYM11 (1984)$g1$i2013000000466$lle013$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10959658$z28-06-02 996 $aTopics in operator theory systems and networks$9918796 997 $aUNISALENTO 998 $ale013$b01-01-94$cm$da $e-$feng$gsz $h0$i1 LEADER 05206nam 22007575 450 001 996550559503316 005 20230810065614.0 010 $a3-031-40923-X 024 7 $a10.1007/978-3-031-40923-3 035 $a(MiAaPQ)EBC30737813 035 $a(Au-PeEL)EBL30737813 035 $a(DE-He213)978-3-031-40923-3 035 $a(PPN)272734020 035 $a(EXLCZ)9928185905900041 100 $a20230810d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Safety, Reliability, and Security$b[electronic resource] $e42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20?22, 2023, Proceedings /$fedited by Jérémie Guiochet, Stefano Tonetta, Friedemann Bitsch 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (291 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14181 311 08$aPrint version: Guiochet, Jérémie Computer Safety, Reliability, and Security Cham : Springer,c2023 9783031409226 327 $aSafety Assurance -- Assurance Case Arguments in the Large ? CERN LHC Machine Protection System -- Identifying Run-time Monitoring Requirements for Autonomous Systems through the Analysis of Safety Arguments -- Redesigning Medical Device Assurance: Separating Technological and Clinical Assurance Cases -- Software Testing & Reliability -- A Cognitive Framework for Modeling Coincident Software Faults: An Experimental Study -- A Taxonomy of Software Defect Forms for Certification Tests in Aviation Industry -- Constraint-guided Test Execution Scheduling: An Experience Report at ABB Robotics -- Neural Networks Robustness & Monitoring -- A low-cost strategic monitoring approach for scalable and interpretable error detection in deep neural networks -- Are Transformers More Robust? Towards Exact Robustness Verification for Transformers -- Model-based Security and Threat Analysis -- Model-based Generation of Attack-Fault Trees -- MBTA: A Model-Based Threat Analysis approach for software architectures -- Attribute Repair for Threat Prevention -- Safety of Autonomous Driving -- Probabilistic Spatial Relations for Monitoring Behavior of Road Users -- Concept and metamodel to support cross-domain safety analysis for ODD expansion of autonomous systems -- Security Engineering -- Pattern-Based Information Flow Control for Safety-Critical On-Chip Systems -- From Standard to Practice: Towards ISA/IEC 62443-conform Public Key Infrastructures -- AI Safety -- The Impact of Training Data Shortfalls on Safety of AI-based Clinical Decision Support Systems -- Data-centric Operational Design Domain Characterization for Machine Learning-based Aeronautical Products -- Online Quantization Adaptation for Fault-Tolerant Neural Network Inference -- Neural Networks & Testing -- Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection -- Towards Scenario-based Safety Validation for Autonomous Trains with Deep Generative Models. 330 $aThis book constitutes the refereed proceedings of the 42nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2023, which took place in Toulouse, France, in September 2023. The 20 full papers included in this volume were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Safety assurance; software testing and reliability; neural networks robustness and monitoring; model-based security and threat analysis; safety of autonomous driving; security engineering; AI safety; and neural networks and testing. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14181 606 $aComputer engineering 606 $aComputer networks 606 $aSoftware engineering 606 $aApplication software 606 $aRobotics 606 $aMicroprogramming 606 $aData protection 606 $aComputer Engineering and Networks 606 $aSoftware Engineering 606 $aComputer and Information Systems Applications 606 $aRobotics 606 $aControl Structures and Microprogramming 606 $aData and Information Security 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aRobotics. 615 0$aMicroprogramming. 615 0$aData protection. 615 14$aComputer Engineering and Networks. 615 24$aSoftware Engineering. 615 24$aComputer and Information Systems Applications. 615 24$aRobotics. 615 24$aControl Structures and Microprogramming. 615 24$aData and Information Security. 676 $a005 700 $aGuiochet$b Jérémie$01427976 701 $aTonetta$b Stefano$01427977 701 $aBitsch$b Friedemann$01427978 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996550559503316 996 $aComputer Safety, Reliability, and Security$93563086 997 $aUNISA