The book at hand presents a careful selection of relevant applications of CI methods for transport, logistics, and supply ...
Continue reading
Contains versions of selected communications presented at the ECCOMAS Thematic Conference in Multibody Dynamics 2003 that ...
Continue reading
This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue reading
This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue reading
This book constitutes the proceedings of the 2005 Asia-Paci?c Computer Systems Architecture Conference (ACSAC 2005) held ...
Continue reading
This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 27th International ...
Continue reading
This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 25th International ...
Continue reading
This book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
Continue reading
This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held ...
Continue reading
The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Continue reading
The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Continue reading
This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held ...
Continue reading
The 2006 edition of the Eurocrypt conference was held in St. Petersburg,Russia from May 28 to June 1, 2006. It was the 25th ...
Continue reading
This book address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis ...
Continue reading
This book address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis ...
Continue reading
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...
Continue reading
This book focuses on exploratory data analysis, learning of latent structures in datasets, and unscrambling of knowledge. ...
Continue reading
This book constitutes the proceedings of the Industrial Conference on Data Mining ICDM-Leipzig was the fourth meeting in ...
Continue reading
Advances in Design examines recent advances and innovations in product design paradigms, methods, tools and applications. ...
Continue reading
Advances in Design and Specification Languages for Embedded Systems is the latest contribution to the Chip Design Languages ...
Continue reading