The theme reflects upon the growth of the digital libraries community and explores new areas that the community could delve ...
WeiterlesenTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
WeiterlesenTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
WeiterlesenCompleteness is one of the most important notions in logic and the foundations of mathematics. Many variants of the notion ...
WeiterlesenThis book constitutes the refereed proceedings of the 6th International Conference on Computational Linguistics and Intelligent ...
WeiterlesenA progress in technologies, the increasing expansion and use of digital environments lead to remarkable shifts of business ...
WeiterlesenEugen Lamers explains the principle of simulation speed-up in general, demonstrates the technique RESTART for the simulation ...
WeiterlesenRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
WeiterlesenThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
WeiterlesenThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
WeiterlesenThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
WeiterlesenThis book was stimulated by the third CWUAAT workshop, held in Cambridge, England in April 2006; the contributors representing ...
WeiterlesenDesigning Inclusive Futures reflects the need to explore, in a coherent way, the issues and practicalities that lie behind ...
WeiterlesenDialogue as a Collective Means of Design Conversation is the second volume edited by Patrick M. Jenlink and Bela H. Banathy ...
WeiterlesenThis book contains the proceedings of the First European Conference on Computer Network Defence which took place in December ...
WeiterlesenThis well-established, didactically excellent textbook combines clarity with extraordinary accuracy in the formation of terms ...
WeiterlesenThe delayed onset of maturity from adolescence to adulthood is gaining the considerable attention of scholars, not to mention ...
WeiterlesenThe sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
WeiterlesenDescribes the development of quality over various stages, from product inspection, through quality control to the present ...
Weiterlesen