الكتب الالكترونية

عدد الكتب: 121 - 133 /133
978-3-540-89304-2
Theory of Quantum Computation, Communication, and Cryptography : Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers

This book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...

اقرأ المزيد
NoIMG
Tools and Algorithms for the Construction and Analysis of Systems : 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part II

This book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...

اقرأ المزيد
978-1-4020-5334-4
Topics in Geometry, Coding Theory and Cryptography

This book presents survey articles on some of these new developments. Most of the material is directly related to the interaction ...

اقرأ المزيد
978-0-387-09428-1
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

اقرأ المزيد
978-1-4020-3685-9
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

اقرأ المزيد
978-3-030-79276-3
Ubiquitous Communications and Network Computing

This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...

اقرأ المزيد
978-3-540-26877-2
Universal Artificial Intelligence

This book presents sequential decision theory from a novel algorithmic information theory perspective. While the former is ...

اقرأ المزيد
978-1-84628-959-0
Variable-length Codes for Data Compression

Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...

اقرأ المزيد
978-3-540-85933-8
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

اقرأ المزيد
978-3-540-78243-8
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

اقرأ المزيد
978-3-030-59016-1
Wireless Algorithms, Systems, and Applications

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...

اقرأ المزيد
978-3-030-59019-2
Wireless Algorithms, Systems, and Applications

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...

اقرأ المزيد
978-3-030-52988-8
Wireless Internet

This book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless Internet, ...

اقرأ المزيد
عدد الكتب: 121 - 133 /133