In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...
Continue readingAccessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...
Continue readingCombinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...
Continue readingThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Continue readingThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Continue readingETAPS 2006 was the ninth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual ...
Continue readingThis book constitutes the proceedings of the 17th International Conference on Compiler Construction, CC 2008. It covers analysis ...
Continue readingThis book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...
Continue readingComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Continue readingThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Continue readingEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue readingEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue readingConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Continue readingThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Continue readingThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Continue readingThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Continue readingConstitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
Continue readingCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Continue reading