This book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...
Continue readingThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Continue readingReports on recent developments in the theory of evolutionary computation, or more generally the domain of randomized search ...
Continue readingThis book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
Continue readingThis book consists of contributions given in honor of Wolfgang J.R. Hoefer. The contributions represent the state of the ...
Continue readingTime-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Continue readingThis two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Continue readingThis is Part II: contiants Tools and Algorithms for the Construction and Analysis of Systems
Continue readingThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Continue readingThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Continue readingOnly in recent years quantitative analysts have asked for the numerical solution of a free-boundary partial di?erential equation. ...
Continue readingTo support application developers in the various tasks involved in this process, several different tools need to be at his ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held ...
Continue readingProvides a self-contained presentation of the foundations of finite fields, including a detailed treatment of their algebraic ...
Continue readingBiology has entered the age of Big Data. A technical revolution has transformed the field, and extracting meaningful information ...
Continue readingThis book presents computational paradigms describing lower- and higher-level cognitive functions, including mechanisms of ...
Continue readingThis volume is a post-event proceedings volume and contains selected papers based on presentations given, and vivid discussions ...
Continue readingThis is a nicely edited volume on Estimation of Distribution Algorithms (EDAs) by leading researchers on this important topic.
Continue reading