The Constraint Handling Rules (CHR) language is a declarative concurrent committed-choice constraint logic programming language ...
اقرأ المزيدThe enormous potential of digital computation to manage new complex systems is impeded by exponential increases in complexity. ...
اقرأ المزيدThe aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...
اقرأ المزيدRecent results in local convergence and semi-local convergence analysis constitute a natural framework for the theoretical ...
اقرأ المزيدThis second edition provides a thorough introduction to contemporary convex function theory with many new results. A large ...
اقرأ المزيدConvex functions play an important role in many branches of mathematics, as well as other areas of science and engineering. ...
اقرأ المزيدConvex functions play an important role in many branches of mathematics, as well as other areas of science and engineering. ...
اقرأ المزيدThis book deals mainly with the study of convex functions and their behavior from the point of view of stability with respect ...
اقرأ المزيدThis book deals mainly with the study of convex functions and their behavior from the point of view of stability with respect ...
اقرأ المزيدMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
اقرأ المزيدOne of the most striking features of Coordination Dynamics is its interdisciplinary character. The problems we are trying ...
اقرأ المزيدRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
اقرأ المزيدExplores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدThis book constitutes the thoroughly refereed postproceedings of the 10th International Workshop on DNA Based Computers, ...
اقرأ المزيدIt is evidence of how well the interdisciplinary nature of the conference has truly matured that the major criterion of quality, ...
اقرأ المزيدThis book constitutes the thoroughly refereed postproceedings of the 12th International Meeting on DNA Computing, DNA12, ...
اقرأ المزيد