الكتب الالكترونية

عدد الكتب: 141 - 160 /187
978-3-540-78127-1
Pillars of Computer Science : Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday

This festschrift volume is dedicated to Boris (Boaz) Trakhtenbrot on the occasion of his 85th birthday. For over half a century, ...

اقرأ المزيد
978-3-540-71027-1
Pixelization Paradigm

The pixelization paradigm states as a postulate that pixelization methods are rich and are worth exploring as far as possible. ...

اقرأ المزيد
978-3-540-88403-3
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

اقرأ المزيد
978-1-4020-6627-6
Practical Problems in VLSI Physical Design Automation

Practical Problems in VLSI Physical Design Automation contains problems and solutions related to various well-known algorithms ...

اقرأ المزيد
978-3-540-77345-0
Practice and Theory of Automated Timetabling VI

This volume contains a selection of the papers presented at the Sixth Int- national Conference on the Practice and Theory ...

اقرأ المزيد
978-1-4842-4398-5
Pro TBB : C++ Parallel Programming with Threading Building Blocks

This book is a modern guide for all C++ programmers to learn Intel Threading Building Blocks (TBB).this book reflects their ...

اقرأ المزيد
978-3-540-78652-8
Probabilistic Inductive Logic Programming : Theory and Applications

One of the key open questions within arti?cial intelligence is how to combine probability and logic with learning. This question ...

اقرأ المزيد
978-3-540-68164-9
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

اقرأ المزيد
978-3-540-89754-5
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

اقرأ المزيد
978-3-540-71677-8
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

اقرأ المزيد
978-3-540-78440-1
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

اقرأ المزيد
978-3-540-69485-4
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

اقرأ المزيد
978-3-540-73817-6
Recent Advances in Constraints

This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...

اقرأ المزيد
978-3-540-89812-2
Recent Advances in Constraints : 12th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2007 Rocquencourt, France, June 7-8, 2007 Revised Selected Papers

This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...

اقرأ المزيد
978-3-540-85521-7
Reliable Implementation of Real Number Algorithms: Theory and Practice : International Seminar Dagstuhl Castle, Germany, January 8-13, 2006 Revised Papers

The book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...

اقرأ المزيد
978-3-540-78839-3
Research in Computational Molecular Biology : 12th Annual International Conference, RECOMB 2008, Singapore, March 30 - April 2, 2008. Proceedings

This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...

اقرأ المزيد
978-3-540-89247-2
Runtime Verification : 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers

The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...

اقرأ المزيد
978-3-540-77156-2
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

اقرأ المزيد
978-3-540-85855-3
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

اقرأ المزيد
978-3-540-73275-4
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

اقرأ المزيد
عدد الكتب: 141 - 160 /187