This book presents selected papers from the Fifteenth International Conference on Dependability of Computer Systems (Dep Co S-RELCOMEX), which illustrate the diversity of theoretical problems in analysis of performability, reliability and security of contemporary computer systems. Covering also methodologies and practical tools involved in this field, it is a valuable reference resource for scientists, researchers, practitioners and students who are dealing with these subjects.
Established in 2006, Dep Co S-RELCOMEX is an annual conference series organised by Wrocław University of Science and Technology. It focuses on the dependability and performability of contemporary computer systems – topics that can provide solutions to new challenges in evaluation of their reliability and efficiency. Since they are probably the most complex technical systems ever engineered by humans, the organization of modern computer systems cannot be modelled and analysed solelyas structures (however complex and distributed) built only on the basis of technical resources. Instead they should be considered as a unique blend of interacting people (their needs and behaviours), networks (together with mobile properties, i Cloud organisation, Internet of Everything) and a large number of users dispersed geographically and producing an unimaginable number of applications. This new, interdisciplinary approach is developing a continually increasing range of methods which apply also the latest findings in artificial intelligence (AI) and computational intelligence (CI).
Tabella dei contenuti
Sequence mining and property verification for fault localization in Simulink models.- Handwritten text lines segmentation using two column projection.- Convolutional Neural Networks for Dot Counting in Fluorescence in Situ Hybridization Imaging.- Classification of Local Administrative Units in Poland: Spatial Approach.- Development of Methodology for Counteraction to Cyber-attacks in Wireless Sensor Networks.- The Need to Use a Hash Function to Build a Crypto Algorithm for Blockchain.- Common Criteria vulnerability assessment ontology.- Risk Management Approach for Revitalization of Post-Mining Areas.- CVE based classification of vulnerable Io T systems.- Reliability and Availability Analysis of Critical Infrastructure Composed of Dependent Systems.