This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis status report features the most recent developments in the field, spanning a wide range of topical areas in the computer ...
Continue readingThis volume represents a "status report" emanating from presentations made during the 18th Annual Workshop on Computer ...
Continue readingThis extensive and comprehensive collection of lectures by world-leading experts in the field introduces and reviews all ...
Continue readingThis extensive and comprehensive collection of lectures by world-leading experts in the field introduces and reviews all ...
Continue readingLiquid crystals, polymers and polymer liquid crystals are soft condensed matter systems of major technological and scientific ...
Continue readingThis book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple commercial ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 9th International Conference on Computer Supported ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThe design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Continue readingThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue readingThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Continue readingproceedings. ACCV has been making its rounds through the Asian landscape and came to India this year. Interest in computer ...
Continue readingACCV has been making its rounds through the Asian landscape and came to India this year. Interest in computer vision is ...
Continue readingThe privilege of organizing it was shared by three universities: The IT University of Copenhagen, the University of Copenhagen, ...
Continue readingThe privilege of organizing it was shared by three universities: The IT University of Copenhagen, the University of Copenhagen, ...
Continue reading