In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...
WeiterlesenAccessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...
WeiterlesenCombinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...
WeiterlesenThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
WeiterlesenThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
WeiterlesenETAPS 2006 was the ninth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual ...
WeiterlesenThis book constitutes the proceedings of the 17th International Conference on Compiler Construction, CC 2008. It covers analysis ...
WeiterlesenThis book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...
WeiterlesenComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
WeiterlesenThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
WeiterlesenEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
WeiterlesenEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
WeiterlesenConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
WeiterlesenThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
WeiterlesenThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
WeiterlesenA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
WeiterlesenThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
WeiterlesenThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
WeiterlesenConstitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
WeiterlesenCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Weiterlesen