This book highlights the latest research findings from the 46th International Meeting of the Italian Statistical Society (SIS) in Rome, during which both methodological and applied statistical research was discussed. This selection of fully peer-reviewed papers, originally presented at the meeting, addresses a broad range of topics, including the theory of statistical inference; data mining and…
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based enc…
The techniques presented here are useful for solving mathematical contest problems in algebra and analysis. Most of the examples and exercises that appear in the book originate from mathematical Olympiad competitions around the world. In the first four chapters the authors cover material for competitions at high school level. The level advances with the chapters. The topics explored include po…
This book focuses on analysis and design problems for high-order linear time-invariant (LTI) swarm systems (multi-agent systems) to achieve consensus, formation, containment and formation-containment. As a first step, the concepts of practical consensus and formation-containment are introduced. Unlike previous research, the formation in this book can be time-varying. A general framework for con…
What does pleasure have to do with morality? What role, if any, should intuition have in the formation of moral theory? If something is ‘simulated’, can it be immoral? This accessible and wide-ranging textbook explores these questions and many more. Key ideas in the fields of normative ethics, metaethics and applied ethics are explained rigorously and systematically, with a vivid writing st…
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …
This book focuses on the basic control and filtering synthesis problems for discrete-time switched linear systems under time-dependent switching signals. Chapter 1, as an introduction of the book, gives the backgrounds and motivations of switched systems, the definitions of the typical time-dependent switching signals, the differences and links to other types of systems with hybrid characterist…
This book presents multivariate time series methods for the analysis and optimal control of feedback systems. Although ships’ autopilot systems are considered through the entire book, the methods set forth in this book can be applied to many other complicated, large, or noisy feedback control systems for which it is difficult to derive a model of the entire system based on theory in that subj…
This book explores time use, time policy, well-being and sustainable development using concepts and findings from time policy research, socio-ecological sustainability research, behavioral economics, consumer research, and research into prosperity and "the good life". Because any change in time structures, whether opening or working hours, school or travel times, has large scale impacts on…
This book examines in detail the planning and modelling of local infrastructure like energy systems, including the complexities resulting from various uncertainties. Readers will discover the individual steps involved in infrastructure planning in cities and territories, as well as the primary requirements and supporting quality factors. Further topics covered concern the field of uncertainty a…