This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer coe?cients ...
WeiterlesenIn the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces ...
WeiterlesenThis book constitutes the refereed proceedings of the 8th International Conference on Cellular Automata for Research and ...
WeiterlesenInformation is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle ...
WeiterlesenThis volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
WeiterlesenIn a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...
WeiterlesenCommunications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...
WeiterlesenThis book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...
WeiterlesenScientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...
WeiterlesenModern cryptology employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research ...
WeiterlesenIt covers bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information ...
WeiterlesenIt covers bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information ...
WeiterlesenThe two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on ...
WeiterlesenThis book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
WeiterlesenAs society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
WeiterlesenThis book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
WeiterlesenThis book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
WeiterlesenThis book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
WeiterlesenThis book constitutes the proceedings of the 15th International Computer Science Symposium in Russia, CSR 2020, held in Yekaterinburg, ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Weiterlesen