Hacking Exposed Linux, 3rd EditionThis authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. ...
Still Image and Video Compression with MATLABThis book describes the principles of image and video compression techniques and introduces current and popular compression standards, such as the MPEG series. Derivations of relevant compression algorithms are developed in an easy-to-follow fashion. Numerous examples are provided in each chapter to illustrate the concepts. The book includes complementary software written in MATLAB SIMULINK to give readers hands-on experience in using and applying various video compression methods. Readers can enhance the software by including their own algorithms. ...
Theories of Programming and Formal MethodsThis Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing, ICTAC 2013. The papers cover a broad spectrum of subjects, from foundational and theoretical topics to programs and systems issues and to applications, comprising formal methods, software and systems modeling, semantics, laws of programming, specification and verification, as well as logics. ...
Guide to Programming and Algorithms Using RWhen encountering difficult concepts in computer programming for the first time, many students struggle to find simple explanations in their textbooks. Information can also be hard to find on common mistakes made when implementing algorithms and writing programs.
This concise and easy-to-follow textbook/guide provides a student-friendly introduction to programming and algorithms. Emphasis is placed on the threshold concepts that present barriers to learning, including the questions that students are often too embarrassed to ask. ...
Aliasing in Object-Oriented ProgrammingThis book presents a survey of the state-of-the-art on techniques for dealing with aliasing in object-oriented programming. It marks the 20th anniversary of the paper The Geneva Convention On The Treatment of Object Aliasing by John Hogg, Doug Lea, Alan Wills, Dennis de Champeaux and Richard Holt. The 22 revised papers were carefully reviewed to ensure the highest quality.The contributions are organized in topical sections on the Geneva convention, ownership, concurrency, alias analysis, controlling effects, verification, programming languages, and visions. ...
Nostradamus 2013Prediction of behavior of the dynamical systems, analysis and modeling of its structure is vitally important problem in engineering, economy and science today. Examples of such systems can be seen in the world around us and of course in almost every scientific discipline including such “exotic” domains like the earth's atmosphere, turbulent fluids, economies (exchange rate and stock markets), population growth, physics (control of plasma), information flow in social networks and its dynamics, chemistry and complex networks. To understand such dynamics and to use it in research or industrial applications, it is important to create its models. For this purpose there is rich spectra of methods, from classical like ARMA models or Box Jenkins method to such modern ones like evolutionary computation, neural networks, fuzzy logic, fractal geometry, deterministic chaos and more. ...
Advanced Network Programming - Principles and TechniquesThe field of network programming is so large, and developing so rapidly, that it can appear almost overwhelming to those new to the discipline.
Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. ...
Unifying Theories of Programming and Formal Engineering MethodsThis book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers. They cover topics such as component-based and service-oriented systems, real-time systems, hybrid systems, cyber physical systems, and present techniques such as inductive theorem proving, model checking, correction by construction through refinement and model transformations, synthesis, and computer algebra. Two of the courses are explicitly related to Hoare and He's Unifying Theories of Programming. ...
Transactions on Petri Nets and Other Models of Concurrency VIIIThe 8th volume of ToPNoC contains revised and extended versions of a selection of the best workshop papers presented at the 33rd International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (Petri Nets 2012). The 10 papers cover a diverse range of topics including model checking and system verification, refinement and synthesis, foundational work on specific classes of Petri nets, and innovative applications of Petri nets and other models of concurrency. Application areas covered in this volume are: biological systems, communication protocols, business processes, collaborative team work, and Petri net education. Thus this volume gives a good view of ongoing concurrent systems and Petri nets research. ...
Interactive Segmentation TechniquesThis book focuses on interactive segmentation techniques, which have been extensively studied in recent decades. Interactive segmentation emphasizes clear extraction of objects of interest, whose locations are roughly indicated by human interactions based on high level perception. This book will first introduce classic graph-cut segmentation algorithms and then discuss state-of-the-art techniques, including graph matching methods, region merging and label propagation, clustering methods, and segmentation methods based on edge detection. A comparative analysis of these methods will be provided with quantitative and qualitative performance evaluation, which will be illustrated using natural and synthetic images. Also, extensive statistical performance comparisons will be made. Pros and cons of these interactive segmentation methods will be pointed out, and their applications will be discussed. ...