The book set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organ...
This book presents the outcomes of the "Design for Future - Managed Software Evolution" priority program 1593, which was launched by the German Research Foundation ("Deutsche Forschungsgemeinschaft (DFG)") to develop new approaches to software engineering with a specific focus on long-lived software systems. The different lifecy...
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
This book approaches the anxieties inherent in food consumption and production in Vietnam. The country's rapid and recent economic integration into global agro-food systems and consumer markets spurred a new quality of food safety concerns, health issues and distrust in food distribution networks that have become increasingly obscured. This ed...
This book constitutes the research workshops, doctoral symposium and panel summaries presented at the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019.XP is the premier agile software development conference combining research and practice. It is a hybrid forum where agile researchers, a...
Learn to design, implement, measure, and improve DevOps programs that are tailored to your organization. This concise guide assists leaders who are accountable for the rapid development of high-quality software applications.
In DevOps for Digital Leaders, deep collective experience on both sides of the dev - ops divide informs the global thought l...
This edited volume is concerned with the evolution and achievements of cooperation in research and innovation between Africa and Europe, and points to the need for more diversified funding and finance mechanisms, and for novel models of collaboration to attract new actors and innovative ideas. It reflects on the political, economic, diplomatic and ...
'This book… brings together high quality research, real world pragmatism and an understanding of the politics of Indian food systems.' – Lawrence Haddad, Executive Director, GAIN and 2018 World Food Prize Laureate'[The authors] have done a masterful job of [demonstrating] paradoxes of India's rapid economic growth concurrent...
This Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing efforts. "Community-oriented policing" is an approach that encourages police to develop and maintain personal relationships with citizens and community organizations. By developing these partnerships, the goal is to...
A series of reforms have greatly improved the efficiency, reliability, and environmental performance of the Chinese power sector. However, significant challenges remain: rapidly rising electricity demand, concerns about power system reliability and energy security, environmental degradation and climate change. China's government explicitly set...
Consumer networks have revolutionized the way companies understand and reach their customers, making possible intricate measurement and accurate prediction at every step of every transaction. The same revolution is underway in our infrastructure, where new generations of sensor-laden power plants, cars and medical devices will generate vast quantit...
This book provides a fresh, updated and science-based perspective on the current status and prospects of the diverse array of topics related to the potato, and was written by distinguished scientists with hands-on global experience in research aspects related to potato. The potato is the third most important global food crop in terms of consumption...
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a s...
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art i...
This book is the product of a collaborative effort involving partners from Africa, Asia, Europe and Latin America who were funded by the International Development Research Centre Programme on Women and Migration (2006-2011). The International Institute of Social Studies at Erasmus University Rotterdam spearheaded a project intended to distill and r...
As the American election administration landscape changes as a result of major court cases, national and state legislation, changes in professionalism, and the evolution of equipment and security, so must the work of on-the-ground practitioners change. This Open Access title presents a series of case studies designed to highlight practical response...
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infras...
This book analyses intellectual property and innovation governance in the development of six key industries in India and China. These industries are reflective of the innovation and economic development of the two economies, or of vital importance to them: the IT Industry, the film industry, the pharmaceutical industry, plant varieties and food sec...
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.
Author Matthew Gast - an industry expert who led the development of ...
This project was initiated in 2009 with the aim to spread knowledge about mobile technologies and encourage people to enter our community or deepen their existing knowledge.
More than twenty writers from the mobile community share their know-how in dealing with topics such as accessibility in mobile apps, UX design, mobile analytics, prototyping...
Organized, authored, and edited over the course of five months by a class of eighteen Virginia Tech undergraduate students, Welcome to the Beatles represents their collective contribution to the larger scholarship on the most important band in rock history. The chapters build upon the work of noted author and historian Mark Lewisohn and take into a...
An Introduction to Computer Networks, a free and open general-purpose computer-networking free book, complete with diagrams and exercises. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, sec...
Take pictures and shoot video with your Raspberry Pi. Connecting a High Quality Camera or Camera Module turns your favourite credit-card-sized computer into a powerful digital camera. Learn how to set up and control the camera to capture stills and video footage. Discover the numerous modes and effects available, and use the camera in a variety of ...
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
Windows Server has powered a generation of organizations, from small businesses to large enterprises. No matter what your role in IT, you can be guaranteed you that have touched Windows Server at some point in your career or at very least you have seen it from afar! This book introduces you to Windows Server 2016, which is the next version of Windo...
Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the ...
Istio is one of the most popular solutions for service meshes in cloud-native infrastructures, and it is most often deployed on Kubernetes clusters. In Istio Succinctly, authors Rahul Rai and Tarun Pabbi provide a practical guide to getting started with Istio, from setting up a Kubernetes cluster, to managing its traffic management, security, obser...
SQL Server is a very complex and powerful product, but it provides tremendous amounts of data about itself. You can use this metadata to improve your database design, increase performance, review security, and more. Joseph D. Booth will show readers sample scripts and queries using information schema views as well as SQL Server-specific views in SQ...
Enterprise Cloud Strategy - Guidance for enterprises looking for proven methods to take their application portfolio to the cloud.
What if you were able to achieve both efficiency and innovation in all business domains and applications across your entire portfolio? What if you could take advantage of the cloud and all of its resources and feature...
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language.
This book shows how to break out a traditiona...