This book constitutes the proceedings of the 31st European Symposium on Programming, ESOP 2022, which was held during April ...
اقرأ المزيد
                The aim of the ProMAS workshop series is to promote and contribute to the establishment of MAS as a mainstream approach to ...
اقرأ المزيد
                Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand ...
اقرأ المزيد
                This book constitutes the refereed proceedings of the 20th EPIA Conference on Artificial Intelligence, EPIA 2021, held virtually ...
اقرأ المزيد
                The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
اقرأ المزيد
                This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيد
                This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
اقرأ المزيد
                This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيد
                Queuing Theory and Telecommunications : Networks and Applications provides some fundamental knowledge in queuing theory, ...
اقرأ المزيد
                The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
اقرأ المزيد
                This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
اقرأ المزيد
                This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
اقرأ المزيد
                The idea of reconfigurable hardware systems has represented the Holy Grail for computer system designers.It has been recognized ...
اقرأ المزيد
                This book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...
اقرأ المزيد
                The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
اقرأ المزيد
                The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
اقرأ المزيد
                This State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing ...
اقرأ المزيد
                The book presented at the symposium focused on topics related to these three events and to artificial intelligence and robotics ...
اقرأ المزيد
                This book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
اقرأ المزيد
                This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
اقرأ المزيد