This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
WeiterlesenThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
WeiterlesenTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
WeiterlesenThis book constitutes the thoroughly refereed proceedings of the 8th International Conference on Data Management Technologies ...
WeiterlesenThis book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
WeiterlesenData Mining and Knowledge Discovery Handbook organizes all major concepts, theories, methodologies, trends, challenges and ...
WeiterlesenThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
WeiterlesenThis two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
WeiterlesenThis volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...
WeiterlesenThe double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
WeiterlesenThis book constitutes the refereed proceedings of the 14th International Baltic Conference on Databases and Information Systems, ...
WeiterlesenThe book concentrates on decision procedures for first-order theories that are commonly used in automated verification and ...
WeiterlesenThe second edition of the workshop on Declarative Agent Languages and Te- nologies (DALT 2004) was held July 2004 in New ...
WeiterlesenThis book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Declarative Agent Languages ...
WeiterlesenThis book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Declarative ...
WeiterlesenPresents a comprehensive comparison of the performance of stochastic optimization algorithms Includes an introduction to ...
WeiterlesenThe IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
WeiterlesenThis tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
WeiterlesenThis book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have ...
Weiterlesen