This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Continue readingThis book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...
Continue readingThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Continue readingReports on recent developments in the theory of evolutionary computation, or more generally the domain of randomized search ...
Continue readingThis book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
Continue readingIn Thermal and Power Management of Integrated Circuits, power and thermal management issues in integrated circuits during ...
Continue readingThis edition guides the reader through successful planning and implementation of a thesis project and provides students in ...
Continue readingYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Continue readingThe book It shows you how the head can be analysed in orthodontists have relied on the interpretation of three dimensions ...
Continue reading3DTV require the integration of a diversity of key technologies from computing to graphics, imaging to display, and signal ...
Continue readingTime-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Continue readingNetwork flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Continue readingThe book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
Continue readingThis two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis book set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Continue reading