This book constitutes the refereed proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2015, held in Hamburg, Germany, in May 2015. The 10 revised full papers and 5 short papers presented were carefully reviewed and selected from 28 submissions. In addition, the book contains one invited paper and 5 papers from a special session on trusted cloud ecosystems.…
Model Validation and Uncertainty Quantification, Volume 3. Proceedings of the 33rd IMAC, A Conference and Exposition on Balancing Simulation and Testing, 2015, the third volume of ten from the Conference brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on fundamental and applied aspects of Structural Dyna…
This book reports on the state of the art in physical ergonomics and is concerned with the design of products, process, services, and work systems to assure their productive, safe, and satisfying use by people. With focus on the human body's responses to physical and physiological work demands, repetitive strain injuries from repetition, vibration, force, and posture are the most common types o…
This book examines real-time target tracking and identification algorithms with a focus on tracking an agile target. The authors look at several problems in which the tradeoff of accuracy and confidence must be made. These issues are explored within the context of specific tracking scenarios chosen to illustrate the tradeoffs in a simple and direct manner. The text covers the Gaussian wavelet e…
This book offers a thorough and systematic introduction to the modified failure mode and effect analysis (FMEA) models based on uncertainty theories (e.g. fuzzy logic, intuitionistic fuzzy sets, D numbers and 2-tuple linguistic variables) and various multi-criteria decision making (MCDM) approaches such as distance-based MCDM, compromise ranking MCDM and hybrid MCDM, etc. As such, it provides e…
This book conveys the essential insights that lie behind success such as the DelFly Micro and the DelFly Explorer. The DelFly Micro, with its 3.07 grams and 10 cm wing span, is still the smallest flapping wing MAV in the world carrying a camera, whilst the DelFly Explorer is the world's first flapping wing MAV that is able to fly completely autonomously in unknown environments. The DelFly proje…
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; pr…
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the …
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …