Preliminarythis book is open access under a cc by 4.0 *** book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors??secondly, can i build trust ...
详细信息
ISBN:
(数字)9783319749501
ISBN:
(纸本)9783319749495
Preliminarythis book is open access under a cc by 4.0 *** book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors??secondly, can i build trust into my products in such a way that i support verification by untrusting customers?? in separate chapters the book takes readers?through the state of the art in fields of computer science that can shed light on these questions.?in a concluding chapter it discusses realistic ways forward.??in discussions on cyber security, there is a tacit assumption that the manufacturer of equipment will collaborate with the user of the equipment to stop third-party wrongdoers.?the snowden files and recent deliberations on the use of chinese equipment in the critical infrastructures of western countries have changed this.?the discourse in both cases revolves around what malevolent manufacturers can do to harm their own customers, and the importance of the matter is on par with questions of national security.
This book is published open access under a CC BY 4.0 license. Predicting the time needed to complete a project, task or daily activity can be difficult and people frequently underestimate how long an activity will tak...
ISBN:
(纸本)9783319749525;9783319749532
This book is published open access under a CC BY 4.0 license. Predicting the time needed to complete a project, task or daily activity can be difficult and people frequently underestimate how long an activity will take. This book sheds light on why and when this happens, what we should do to avoid it and how to give more realistic time predictions. It describes methods for predicting time usage in situations with high uncertainty, explains why two plus two is usually more than four in time prediction contexts, reports on research on time prediction biases, and summarizes the evidence in support of different time prediction methods and principles. Based on a comprehensive review of the research, it is the first book summarizing what we know about judgment-based time predictions. Large parts of the book are directed toward people wishing to achieve better time predictions in their professional life, such as project managers, graphic designers, architects, engineers, film producers, consultants, software developers, or anyone else in need of realistic time usage predictions. It is also of benefit to those with a general interest in judgment and decision-making or those who want to improve their ability to predict and plan ahead in daily life.
This book offers a concise and gentle introduction to finite element programming in python based on the popular fenics software library. Using a series of examples, including the poisson equation, the equations of lin...
详细信息
ISBN:
(数字)9783319524627
ISBN:
(纸本)9783319524610
This book offers a concise and gentle introduction to finite element programming in python based on the popular fenics software library. Using a series of examples, including the poisson equation, the equations of linear elasticity, the incompressible navier–stokes equations, and systems of nonlinear advection–diffusion–reaction equations, it guides readers through the essential steps to quickly solving a pde in fenics, such as how to define a finite variational problem, how to set boundary conditions, how to solve linear and nonlinear systems, and how to visualize solutions and structure finite element python *** book is open access under a cc by license.
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses can...
详细信息
ISBN:
(数字)9783319300702
ISBN:
(纸本)9783319300689
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of netflix’s media streaming solution, norwegian telecom infrastructures, e-government platforms, and numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
This book is published open access under a CC BY 4.0 license.;Large parts of the book are directed toward people wishing to achieve better time predictions in their professional life, such as project managers, graphic...
详细信息
ISBN:
(数字)9783319749532
ISBN:
(纸本)9783319749525
This book is published open access under a CC BY 4.0 license.;Large parts of the book are directed toward people wishing to achieve better time predictions in their professional life, such as project managers, graphic designers, architects, engineers, film producers, consultants, software developers, or anyone else in need of realistic time usage predictions. It is also of benefit to those with a general interest in judgment and decision-making or those who want to improve their ability to predict and plan ahead in daily life.
This open access book offers comprehensive, self-contained knowledge on Digital Twin (DT), which is a very promising technology for achieving digital intelligence in the next-generation wireless communications and com...
详细信息
ISBN:
(数字)9783031518195
ISBN:
(纸本)9783031518188
This open access book offers comprehensive, self-contained knowledge on Digital Twin (DT), which is a very promising technology for achieving digital intelligence in the next-generation wireless communications and computing networks. DT is a key technology to connect physical systems and digital spaces in Metaverse.
暂无评论