In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...
Continue reading
Accessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...
Continue reading
Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...
Continue reading
This book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Continue reading
This book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Continue reading
ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual ...
Continue reading
This book constitutes the proceedings of the 17th International Conference on Compiler Construction, CC 2008. It covers analysis ...
Continue reading
This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...
Continue reading
Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Continue reading
The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Continue reading
Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue reading
Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue reading
Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Continue reading
These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Continue reading
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue reading
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue reading
This book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Continue reading
This book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Continue reading
Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
Continue reading
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Continue reading