This book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيد
To support application developers in the various tasks involved in this process, several different tools need to be at his ...
اقرأ المزيد
This book contains a collection of papers exploring the cross-linguistic expression of topic and focus. A diverse set of ...
اقرأ المزيد
In this book, an international team of highly qualified experts treats important topics in acoustic echo and noise control ...
اقرأ المزيد
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
اقرأ المزيد
This book presents computational paradigms describing lower- and higher-level cognitive functions, including mechanisms of ...
اقرأ المزيد
This book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
اقرأ المزيد
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
This volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
اقرأ المزيد
This book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
اقرأ المزيد
This, the 37th issue of the Transactions on Computational Science, is devoted to the area of Computer Graphics. The 9 papers ...
اقرأ المزيد
The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
اقرأ المزيد
This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيد
This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيد
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيد
Every now and then, a good book comes along and quite rightfully makes itself a distinguished place amongthe existing books ...
اقرأ المزيد
including our own. By reconstructing the theoretical framework of transmedial narration, this book enables the inclusion ...
اقرأ المزيد
Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
اقرأ المزيد