The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue readingThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Continue readingThis book constitutes the refereed proceedings of the International Conference on Computer Vision and Graphics, ICCVG 2020, ...
Continue readingThis book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ...
Continue readingThesearetheproceedingsofthe21stInternationalSymposiumonComputerand ? Information Sciences (ISCIS 2006) held in Istanbul, ...
Continue readingThis book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...
Continue readingThis book constitutes revised selected papers of the First International Conference on Computing Science, Communication and ...
Continue readingZero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly ...
Continue readingConstituents of Modern System-safety Thinking contains the invited papers presented at the Thirteenth annual Safety-critical ...
Continue readingThis book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...
Continue readingHistory based access control and secure information flow The spec# programming system Mastering test generation from smart ...
Continue readingThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
Continue readingThe aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...
Continue readingThis book puts the larger vision of ubiquitous computing in the context of today’s mobile and distributed computing systems ...
Continue readingCooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques ...
Continue readingThis book constitutes the proceedings of the 17th International Conference on Cooperative Design, Visualization, and Engineering, ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Cooperative Design, Visualization, ...
Continue readingThe definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...
Continue reading