
Verification and Evaluation of Computer and Communication Systems
17th International Conference, VECoS 2024, Djerba, Tunisia, October 16?18, 2024, Proceedings
Series: Lecture Notes in Computer Science; 15466;
- Publisher's listprice EUR 62.05
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 8% (cc. 2 106 Ft off)
- Discounted price 24 216 Ft (23 063 Ft + 5% VAT)
26 321 Ft
Availability
Not yet published.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Springer
- Date of Publication 18 May 2025
- Number of Volumes 1 pieces, Book
- ISBN 9783031853555
- Binding Paperback
- No. of pages250 pages
- Size 235x155 mm
- Language English
- Illustrations 20 Illustrations, black & white; 88 Illustrations, color 700
Categories
Long description:
This book constitutes the refereed proceedings of the 17th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2024, held in Djerba, Tunisia, during October 16?18, 2024.
The 16 full papers included in this book were carefully reviewed and selected from 42 submissions. They deal with the state of the art and challenges in modern computer and communication systems in the areas of verification, control, performance, and dependability evaluation.
MoreTable of Contents:
.- Formal Verification of Coupled Transmission Lines using Theorem Proving.
.- Optimizing Label Coverage using Regular Expression-Based Linear Programming.
.- Formal Verification of Declarative Specifications of BPs: DCR2CPN based Approach.
.- Toward Green Data Lake Management and Analysis through a CTMC Model.
.- A High Parallelization Method for Automated Formal Verification of Deep Neural Networks.
.- Monitoring of Neural Network Classifiers using Neuron Activation Paths.
.- Formal Security Analysis of Deep Neural Network Architecture.
.- Intrusion Detection using an enhancement Bi-LSTM Recurrent Neural Network model.
.- A Formal Approach for Verifying and Validating Security Objectives in Software Architecture.
.- Supervisory Control of Cyber-Physical Systems Using Labeled Petri Nets Under Sensor and Actuator Attacks.
.- ERTMS/ETCS L3: Usable Formal Models for the “Loss of Train Integrity” Operation Scenario.
.- Towards a Model for Energy-Efficient and Flexible IoT Systems.
.- Integrating SysML and Timed Reo to Model and Verify Cyber-Physical Systems Interactions with Timing Constraints.
.- A Reliable and Resource-Aware Federated Learning Solution by Decentralizing Client Selection for IoT Devices.
.- DRL based SFC Orchestration in SDN/NFV Environments subject to Transient Unavailability.