Electronic Books

Total Books: 221 - 240 /722
Constraint Handling Rules : Current Research Topics

The Constraint Handling Rules (CHR) language is a declarative concurrent committed-choice constraint logic programming language ...

Weiterlesen
Constraint Theory

The enormous potential of digital computation to manage new complex systems is impeded by exponential increases in complexity. ...

Weiterlesen
Contemporary Cryptology / Public key encription / Random functions / computational complexity / cryptography / cryptology

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...

Weiterlesen
Convergence and Applications of Newton-type Iterations

Recent results in local convergence and semi-local convergence analysis constitute a natural framework for the theoretical ...

Weiterlesen
Convex Functions and Their Applications

This second edition provides a thorough introduction to contemporary convex function theory with many new results. A large ...

Weiterlesen
Convex Functions and their Applications

Convex functions play an important role in many branches of mathematics, as well as other areas of science and engineering. ...

Weiterlesen
Convex Functions and their Applications

Convex functions play an important role in many branches of mathematics, as well as other areas of science and engineering. ...

Weiterlesen
Convexity and Well-Posed Problems

This book deals mainly with the study of convex functions and their behavior from the point of view of stability with respect ...

Weiterlesen
Convexity and Well-Posed Problems

This book deals mainly with the study of convex functions and their behavior from the point of view of stability with respect ...

Weiterlesen
Coordinated Multiuser Communications

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...

Weiterlesen
Coordination: Neural, Behavioral and Social Dynamics

One of the most striking features of Coordination Dynamics is its interdisciplinary character. The problems we are trying ...

Weiterlesen
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

Weiterlesen
Crypto-Finance, Law and Regulation : Governing an Emerging Ecosystem / Joseph Lee

Explores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...

Weiterlesen
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

Weiterlesen
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Weiterlesen
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Weiterlesen
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

Weiterlesen
DNA Computing (vol. # 3384)

This book constitutes the thoroughly refereed postproceedings of the 10th International Workshop on DNA Based Computers, ...

Weiterlesen
DNA Computing (vol. # 3892)

It is evidence of how well the interdisciplinary nature of the conference has truly matured that the major criterion of quality, ...

Weiterlesen
DNA Computing (vol. # 4287)

This book constitutes the thoroughly refereed postproceedings of the 12th International Meeting on DNA Computing, DNA12, ...

Weiterlesen
Total Books: 221 - 240 /722