The theme reflects upon the growth of the digital libraries community and explores new areas that the community could delve ...
اقرأ المزيدTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
اقرأ المزيدTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
اقرأ المزيدCompleteness is one of the most important notions in logic and the foundations of mathematics. Many variants of the notion ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 6th International Conference on Computational Linguistics and Intelligent ...
اقرأ المزيدA progress in technologies, the increasing expansion and use of digital environments lead to remarkable shifts of business ...
اقرأ المزيدEugen Lamers explains the principle of simulation speed-up in general, demonstrates the technique RESTART for the simulation ...
اقرأ المزيدRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
اقرأ المزيدThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيدThis book was stimulated by the third CWUAAT workshop, held in Cambridge, England in April 2006; the contributors representing ...
اقرأ المزيدDesigning Inclusive Futures reflects the need to explore, in a coherent way, the issues and practicalities that lie behind ...
اقرأ المزيدDialogue as a Collective Means of Design Conversation is the second volume edited by Patrick M. Jenlink and Bela H. Banathy ...
اقرأ المزيدThis book contains the proceedings of the First European Conference on Computer Network Defence which took place in December ...
اقرأ المزيدThis well-established, didactically excellent textbook combines clarity with extraordinary accuracy in the formation of terms ...
اقرأ المزيدThe delayed onset of maturity from adolescence to adulthood is gaining the considerable attention of scholars, not to mention ...
اقرأ المزيدThe sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
اقرأ المزيدDescribes the development of quality over various stages, from product inspection, through quality control to the present ...
اقرأ المزيد