Modern software systems are becoming more complex in many ways and are having to cope with a growing number of abnormal situations ...
Continue readingThis book treats the Mathematics of many important areas in digital information processing.It covers, in a unified presentation, ...
Continue readingAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
Continue readingAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms ...
Continue readingThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Continue readingThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic ...
Continue readingIn this book, a wide spectrum of fault diagnosis techniques have been developed. A major category of fault diagnosis techniques ...
Continue readingSoftware development for the automotive domain is currently subject to a silent revolution. On the one hand, software has ...
Continue readingThis book provides sought-after guidance to primary care physicians on preparing for and responding to terrorist events. ...
Continue readingThis book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008. The papers cover network ...
Continue readingThis volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
Continue readingThis edited collection brings together established and new perspectives on Cold War civil defence in Western Europe within ...
Continue readingThis book brings together a set of original studies that use cutting-edge computational methods to investigate conflict ...
Continue readingIn this volume, the basin of attraction of an equilibrium of an ordinary differential equation can be determined using a ...
Continue readingMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
Continue readingThis book charts these opportunities and challenges through unprecedented access to the police and diverse communities in ...
Continue readingOne key outcome of this book is a better understanding of the independent contributions from across the international community ...
Continue readingConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Continue reading