This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue reading
Presents principles of RAC, including theories and experiments Describes advanced behavior and properties Covers specifications ...
Continue reading
The book addressed span a wide range of problems and solutions associated with the teaching of programming such as introductory ...
Continue reading
The first part of these proceedings describes the current capabilities of various satellite experiments which are performing ...
Continue reading
This monograph addresses advances in representation learning, a cutting-edge research area of machine learning. Representation ...
Continue reading
The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue reading
A practical guide to residential space planning, in this room-by-room guide with up-to-date info on accessibility, ergonomics, ...
Continue reading
The book describes the algorithms involved in recovering UML diagrams from the code and the techniques that can be adopted ...
Continue reading
The eukaryotic translation machinery must recognize the site on a messenger RNA (mRNA) where decoding should begin and where ...
Continue reading
It explains how to model a rigid-body system and how to analyze it, and it presents the most comprehensive collection of ...
Continue reading
This book brings together the fields of robot spatial mapping and cognitive spatial mapping, Robot spatial mapping, in this ...
Continue reading
Best selling author Paul Sanghera offers cohesive, concise, yet comprehensive coverage of all the topics included in the ...
Continue reading
This paradigm is based on the following important principles of distributed - plications: Communication: large systems tend ...
Continue reading
These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Continue reading
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Continue reading
One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators ...
Continue reading
Constitutes the proceedings of the 7th International Symposium on Self-Stabilizing Systems, held in Barcelona, Spain, in ...
Continue reading
S3 is a forum for discussion of topics relating to computer systems and languages that are able to bootstrap, implement, ...
Continue reading
Provides a concise introduction to the key concepts of semiotics in accessible and jargon-free language. Demystifying what ...
Continue reading
Provides a concise introduction to the key concepts of semiotics in accessible and jargon-free language. Demystifying what ...
Continue reading