This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue readingPresents principles of RAC, including theories and experiments Describes advanced behavior and properties Covers specifications ...
Continue readingThe book addressed span a wide range of problems and solutions associated with the teaching of programming such as introductory ...
Continue readingThe first part of these proceedings describes the current capabilities of various satellite experiments which are performing ...
Continue readingThis monograph addresses advances in representation learning, a cutting-edge research area of machine learning. Representation ...
Continue readingThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue readingA practical guide to residential space planning, in this room-by-room guide with up-to-date info on accessibility, ergonomics, ...
Continue readingThe book describes the algorithms involved in recovering UML diagrams from the code and the techniques that can be adopted ...
Continue readingThe eukaryotic translation machinery must recognize the site on a messenger RNA (mRNA) where decoding should begin and where ...
Continue readingIt explains how to model a rigid-body system and how to analyze it, and it presents the most comprehensive collection of ...
Continue readingThis book brings together the fields of robot spatial mapping and cognitive spatial mapping, Robot spatial mapping, in this ...
Continue readingBest selling author Paul Sanghera offers cohesive, concise, yet comprehensive coverage of all the topics included in the ...
Continue readingThis paradigm is based on the following important principles of distributed - plications: Communication: large systems tend ...
Continue readingThese are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Continue readingSAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Continue readingOne of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators ...
Continue readingConstitutes the proceedings of the 7th International Symposium on Self-Stabilizing Systems, held in Barcelona, Spain, in ...
Continue readingS3 is a forum for discussion of topics relating to computer systems and languages that are able to bootstrap, implement, ...
Continue readingProvides a concise introduction to the key concepts of semiotics in accessible and jargon-free language. Demystifying what ...
Continue readingProvides a concise introduction to the key concepts of semiotics in accessible and jargon-free language. Demystifying what ...
Continue reading