Search

Category : "IT and Related" with 239 Results

This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, researchers, engineers, and research strategists working in this field. The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring the quality and reliability of these services. The objective of this book is, by applying a systematic approach, to assess the state-of-the-art and consolidate the main research results achieved in this area.

Available in :
  • 1
  • 0

This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of computer science that can shed light on these questions. In a concluding chapter it discusses realistic ways forward. In discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers. The Snowden files and recent deliberations on the use of Chinese equipment in the critical infrastructures of western countries have changed this. The discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security. This book is of great interest to ICT and security professionals who need a clear understanding of the two questions posed in the subtitle, and to decision-makers in industry, national bodies and nation states.

Available in :
  • 1
  • 0

This book visualizes mortality dynamics in the Lexis diagram. While the standard approach of plotting death rates is also covered, the focus in this book is on the depiction of rates of mortality improvement over age and time. This rather novel approach offers a more intuitive understanding of the underlying dynamics, enabling readers to better understand whether period- or cohort-effects were instrumental for the development of mortality in a particular country. Besides maps for single countries, the book includes maps on the dynamics of selected causes of death in the United States, such as cardiovascular diseases or lung cancer. The book also features maps for age-specific contributions to the change in life expectancy, for cancer survival and for seasonality in mortality for selected causes of death in the United States. The book is accompanied by instructions on how to use the freely available R Software to produce these types of surface maps. Readers are encouraged to use the presented tools to visualize other demographic data or any event that can be measured by age and calendar time, allowing them to adapt the methods to their respective research interests. The intended audience is anyone who is interested in visualizing data by age and calendar time; no specialist knowledge is required.

Available in :
  • 1
  • 0

This open access book provides innovative methods and original applications of sequence analysis (SA) and related methods for analysing longitudinal data describing life trajectories such as professional careers, family paths, the succession of health statuses, or the time use. The applications as well as the methodological contributions proposed in this book pay special attention to the combined use of SA and other methods for longitudinal data such as event history analysis, Markov modelling, and sequence network. The methodological contributions in this book include among others original propositions for measuring the precarity of work trajectories, Markov-based methods for clustering sequences, fuzzy and monothetic clustering of sequences, network-based SA, joint use of SA and hidden Markov models, and of SA and survival models. The applications cover the comparison of gendered occupational trajectories in Germany, the study of the changes in women market participation in Denmark, the study of typical day of dual-earner couples in Italy, of mobility patterns in Togo, of internet addiction in Switzerland, and of the quality of employment career after a first unemployment spell. As such this book provides a wealth of information for social scientists interested in quantitative life course analysis, and all those working in sociology, demography, economics, health, psychology, social policy, and statistics.

Available in :
  • 1
  • 0

This volume contains the papers presented at the 27th European Symposium on Programming (ESOP 2018) held April 16–19, 2018, in Thessaloniki, Greece. ESOP is one of the European Joint Conferences on Theory and Practice of Software (ETAPS). It is devoted to fundamental issues in the specification, design, analysis, and implementation of programming languages and systems

Available in :
  • 1
  • 0