This two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيدThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيدThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
اقرأ المزيدThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
اقرأ المزيدThis book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
اقرأ المزيدThe first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
اقرأ المزيدThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
اقرأ المزيدThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
اقرأ المزيدThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
اقرأ المزيدThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
اقرأ المزيدInterference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
اقرأ المزيدThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
اقرأ المزيدThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
اقرأ المزيدThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيد