This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 20th International Conference on Computer Aided Verification, CAV 2008, ...
اقرأ المزيد
This volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
اقرأ المزيد
The volume cover logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; ...
اقرأ المزيد
This volume contains the proceedings of the CASC 2005 continued a tradition — started in 1998 — of international con-ferences ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Computer Music Modeling ...
اقرأ المزيد
This book constitutes the proceedings of the Fifth European Performance Engineering Workshop, EPEW 2008, held in Palma de ...
اقرأ المزيد
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Computer Science Symposium in Russia, CSR 2008, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the First International Symposium on Computer Science in Russia, CSR 2006. ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 19th International Workshop on Computer Science Logic, CSL 2005, held ...
اقرأ المزيد
Coverage includes automated deduction and interactive theorem proving, constructive mathematics and type theory, equational ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 22nd International Workshop on Computer Science Logic, CSL 2008, held ...
اقرأ المزيد
This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
اقرأ المزيد
This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
اقرأ المزيد
The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 6th International Conference on Computer Vision Systems, ICVS 2008, ...
اقرأ المزيد
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد