1.Detection of network attacks using hybrid ARIMA-GARCH model- 2.Towards mixed-mode risk management - a concept; Andrzej Bialas and Barbara Flisiuk.- 3.Software support of the Common Criteria vulnerability assessment.- 4.On the performance of some C# constructions.- 5.Deep Stacking Convex Neuro-Fuzzy System and its On-line Learning.- 6.Fault tolerant ASIC/ULA-based computing systems testing via FPGA prototyping with fault injection.- 7.Critical Energy Infrastructure Safety Assurance Strategies Considering Emergent Interaction Risk.- 8.Modelling an Optimal Capital Structure of the Telecommunication Company.- 9.Specification of constraints in a System-of-Systems configuration; Dariusz Caban and Tomasz Walkowiak.- 10.A Methodological Framework for Model-based Self-Management of Services and Components in Dependable Cyber-Physical Systems.- 11.Maintenance of wind turbine scheduling based on output power data and wind forecast.- 12.Deadlock detection in distributed systems using the IMDS formalism and Petri nets.-.- 13.Scheduling tasks in embedded systems based on NoC architecture using Simulated Annealing.- 14.Adaptation of Ant Colony Algorithm for CAD of complex systems with higher degree of dependability.- 15.Context-Aware Anomaly Detection in Embedded Systems;Fatemeh Ehsani-Besheli and Hamid R. Zarandi.- 16.Comparative analysis of calculations in cryptographic protocols using a combination of different bases of finite fields .- 17.Dynamic Redundancy in Communication Network of Air Traffic Management System.- 18.Availability models and maintenance strategies for smart building automation systems considering attacks on component vulnerabilities.- 19.Concept of multi-criteria evaluation of the airport security control process .- 20.Extending Continuous Integration with post-mortem debug automation of unhandled exceptions occurred in kernel or user mode applications.- 21.The Methodology of Studying of Active Traffic Management Module Self-Oscillation Regime.- 22.Effectiveness examination of a multi-channel CSMA/CA detector.- 23.IaaS vs. traditional hosting for web applications - cost effectiveness analysis for a local market.- 24.High quality stabilization of an inverted pendulum using the controller based on trigonometric function.- 25.The application of RFID technology in supporting the process of reliable identification of objects in video surveillance systems.- 26.Aspect-oriented management of service requests for assurance of high performance and dependability.- 27.Process of mobile application development from the security perspective.- 28.Managing and Enhancing Performance Benchmarks;Jakub Maleszewski and Janusz Sosnowski.- 29.Reliability Optimization for Controller Placement in Software-Defined Networks.- 30.Agent Approach to Network Systems Experimental Analysis in Case of Critical Situations.- 31.RELIABILITY ASSESSMENT OF DRIVING SYSTEMS OF CITY BUSES;Marek M3yñczak.- 32.Testing the significance of parameters of models estimating execution time of parallel program loops according to the Open MPI standard.- 33.On application of regime-switching models for short-term traffic flow forecasting.- 34.Critical information infrastructure protection model and methodology.- 35.The method of creating players in the marketing strategy;Henryk Piech.- 36.Principles of mobile walking robot control in scope of technical monitoring tasks.- 37.Computer Systems - Simple.- 38.Improving FPGA Implementations of BLAKE and BLAKE2 Algorithms with Memory Resources.- 39.Assurance Case Patterns On-line Catalogue;Monika Szczygielska and Aleksander Jarzêbowicz.- 40.Information system as a cause of cargo handling process disruption in intermodal terminal.- 42.Stability Enhancement Against Fluctuations in Complex Networks by Optimal Bandwidth Allocation.- 43.The scope of the collected data for a holistic risk assessment performance in the road freight transport companies.- 44.Language Processing Modelling Notation - orchestration of NLP microse
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days
Share This Book: