Proceedings of the 15th International Conference on Man–Machine–Environment System Engineering

Proceedings of the 15th International Conference on Man–Machine–Environment System Engineering
Author: Shengzhao Long
Publisher: Springer
Total Pages: 695
Release: 2015-09-05
Genre: Technology & Engineering
ISBN: 366248224X

This research topic was first established in China by Professor ShengZhao Long in 1981, with direct support from one of the greatest modern Chinese scientists, XueSen Qian. In a letter to ShengZhao Long from October 22nd, 1993, XueSen Qian wrote: “You have created a very important modern science subject and technology in China!” MMESE primarily focuses on the relationship between Man, Machine and Environment, studying the optimum combination of man-machine-environment systems. In this system, “Man” refers to working people as the subject in the workplace (e.g. operators, decision-makers); “Machine” is the general name for any object controlled by Man (including tools, machinery, computers, systems and technologies), and “Environment” describes the specific working conditions under which Man and Machine interact (e.g. temperature, noise, vibration, hazardous gases etc.). The three goals of optimization are to ensure safety, efficiency and economy. These proceedings are an academic showcase of the best papers selected from more than 400 submissions, introducing readers to the top research topics and the latest developmental trends in the theory and application of MMESE. These proceedings are interdisciplinary studies on the concepts and methods of physiology, psychology, system engineering, computer science, environment science, management, education, and other related disciplines. Researchers and professionals who study an interdisciplinary subject crossing above disciplines or researchers on MMESE subject will be mainly benefited from these proceedings.

Computer Safety, Reliability, and Security

Computer Safety, Reliability, and Security
Author: Amund Skavhaug
Publisher: Springer
Total Pages: 324
Release: 2016-09-06
Genre: Computers
ISBN: 3319454773

This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection, safety assurance, formal verification, automotive, anomaly detection and resilience, cyber security, fault trees, and safety analysis.

The Essence of Software Engineering

The Essence of Software Engineering
Author: Volker Gruhn
Publisher: Springer
Total Pages: 247
Release: 2018-06-13
Genre: Computers
ISBN: 3319738976

This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research findings dealing with current practical software engineering issues and also pointers to potential future developments. Celebrating the 20th anniversary of adesso AG, adesso gathered some of the pioneers of software engineering including Manfred Broy, Ivar Jacobson and Carlo Ghezzi at a special symposium, where they presented their thoughts about latest software engineering research and which are part of this book. This way it offers readers a concise overview of the essence of software engineering, providing valuable insights into the latest methodological research findings and adesso’s experience applying these results in real-world projects.

Dependable Computing

Dependable Computing
Author: Ravishankar K. Iyer
Publisher: John Wiley & Sons
Total Pages: 852
Release: 2024-04-18
Genre: Computers
ISBN: 111974346X

Dependable Computing Covering dependability from software and hardware perspectives Dependable Computing: Design and Assessment looks at both the software and hardware aspects of dependability. This book: Provides an in-depth examination of dependability/fault tolerance topics Describes dependability taxonomy, and briefly contrasts classical techniques with their modern counterparts or extensions Walks up the system stack from the hardware logic via operating systems up to software applications with respect to how they are hardened for dependability Describes the use of measurement-based analysis of computing systems Illustrates technology through real-life applications Discusses security attacks and unique dependability requirements for emerging applications, e.g., smart electric power grids and cloud computing Finally, using critical societal applications such as autonomous vehicles, large-scale clouds, and engineering solutions for healthcare, the book illustrates the emerging challenges faced in making artificial intelligence (AI) and its applications dependable and trustworthy. This book is suitable for those studying in the fields of computer engineering and computer science. Professionals who are working within the new reality to ensure dependable computing will find helpful information to support their efforts. With the support of practical case studies and use cases from both academia and real-world deployments, the book provides a journey of developments that include the impact of artificial intelligence and machine learning on this ever-growing field. This book offers a single compendium that spans the myriad areas in which dependability has been applied, providing theoretical concepts and applied knowledge with content that will excite a beginner, and rigor that will satisfy an expert. Accompanying the book is an online repository of problem sets and solutions, as well as slides for instructors, that span the chapters of the book.

Certifications of Critical Systems – The CECRIS Experience

Certifications of Critical Systems – The CECRIS Experience
Author: Andrea Bondavalli
Publisher: CRC Press
Total Pages: 197
Release: 2022-09-01
Genre: Computers
ISBN: 1000792145

In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.

Handbook of Software Fault Localization

Handbook of Software Fault Localization
Author: W. Eric Wong
Publisher: John Wiley & Sons
Total Pages: 614
Release: 2023-04-21
Genre: Computers
ISBN: 1119291828

Handbook of Software Fault Localization A comprehensive analysis of fault localization techniques and strategies In Handbook of Software Fault Localization: Foundations and Advances, distinguished computer scientists Prof. W. Eric Wong and Prof. T.H. Tse deliver a robust treatment of up-to-date techniques, tools, and essential issues in software fault localization. The authors offer collective discussions of fault localization strategies with an emphasis on the most important features of each approach. The book also explores critical aspects of software fault localization, like multiple bugs, successful and failed test cases, coincidental correctness, faults introduced by missing code, the combination of several fault localization techniques, ties within fault localization rankings, concurrency bugs, spreadsheet fault localization, and theoretical studies on fault localization. Readers will benefit from the authors’ straightforward discussions of how to apply cost-effective techniques to a variety of specific environments common in the real world. They will also enjoy the in-depth explorations of recent research directions on this topic. Handbook of Software Fault Localization also includes: A thorough introduction to the concepts of software testing and debugging, their importance, typical challenges, and the consequences of poor efforts Comprehensive explorations of traditional fault localization techniques, including program logging, assertions, and breakpoints Practical discussions of slicing-based, program spectrum-based, and statistics-based techniques In-depth examinations of machine learning-, data mining-, and model-based techniques for software fault localization Perfect for researchers, professors, and students studying and working in the field, Handbook of Software Fault Localization: Foundations and Advances is also an indispensable resource for software engineers, managers, and software project decision makers responsible for schedule and budget control.

Meta Heuristic Techniques in Software Engineering and Its Applications

Meta Heuristic Techniques in Software Engineering and Its Applications
Author: Mihir Narayan Mohanty
Publisher: Springer Nature
Total Pages: 368
Release: 2022-10-17
Genre: Technology & Engineering
ISBN: 3031117131

This book discusses an integration of machine learning with metaheuristic techniques that provide more robust and efficient ways to address traditional optimization problems. Modern metaheuristic techniques, along with their main characteristics and recent applications in artificial intelligence, software engineering, data mining, planning and scheduling, logistics and supply chains, are discussed in this book and help global leaders in fast decision making by providing quality solutions to important problems in business, engineering, economics and science. Novel ways are also discovered to attack unsolved problems in software testing and machine learning. The discussion on foundations of optimization and algorithms leads beginners to apply current approaches to optimization problems. The discussed metaheuristic algorithms include genetic algorithms, simulated annealing, ant algorithms, bee algorithms and particle swarm optimization. New developments on metaheuristics attract researchers and practitioners to apply hybrid metaheuristics in real scenarios.

Theory and Practice of Model Transformations

Theory and Practice of Model Transformations
Author: Davide Di Ruscio
Publisher: Springer
Total Pages: 215
Release: 2014-07-05
Genre: Computers
ISBN: 3319087894

This book constitutes the refereed proceedings of the 7th International Conference on Model Transformation, ICMT 2014, held in York, UK, in July 2014. The 14 revised papers were carefully selected from 38 submissions. The papers have been organized in topical sections on model transformation testing, foundations of model synchronization, applications of model synchronization and tracing and reverse engineering of transformations.