This book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...
WeiterlesenThis book is written for people who are interested in stochastic differential equations (SDEs) and their applications. It ...
WeiterlesenThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
WeiterlesenThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
WeiterlesenThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
WeiterlesenThis book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held ...
WeiterlesenThis book brings together scholars in the fields of management, public policy, regional studies, and organization theory ...
WeiterlesenThis inaugural volume is devoted to computer systems research with an emphasis on core computational science issues faced ...
WeiterlesenThe recent paradigmatic shift in biology towards a system view of biological phenomena requires a corresponding paradigmatic ...
WeiterlesenVolume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
WeiterlesenL’esigenza di quest’opera nasce dalla necessità di raccogliere, integrare e rendere disponibile agli operatori del settore ...
WeiterlesenThere is little literature on digestive and thoracic endocrine tumors. The complexity of their management, often entrusted ...
WeiterlesenTumor Induced Immune Suppression: Mechanisms and Therapeutic Reversal focuses on the critical question of tumor biology: ...
WeiterlesenTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
WeiterlesenThe book offers an easy introduction to fast growing research areas in evolution of species, population genetics, ecological ...
WeiterlesenInterference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
WeiterlesenThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
WeiterlesenThis volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
WeiterlesenInformation Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
WeiterlesenThis volume, edited by Constantine Stephanidis, contains papers in the thematic area of Universal Access in Human-Computer ...
Weiterlesen