This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
This status report features the most recent developments in the field, spanning a wide range of topical areas in the computer ...
Continue reading
This volume represents a "status report" emanating from presentations made during the 18th Annual Workshop on Computer ...
Continue reading
This extensive and comprehensive collection of lectures by world-leading experts in the field introduces and reviews all ...
Continue reading
This extensive and comprehensive collection of lectures by world-leading experts in the field introduces and reviews all ...
Continue reading
Liquid crystals, polymers and polymer liquid crystals are soft condensed matter systems of major technological and scientific ...
Continue reading
This book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative ...
Continue reading
The design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple commercial ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 9th International Conference on Computer Supported ...
Continue reading
The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue reading
The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Continue reading
This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Continue reading
The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Continue reading
proceedings. ACCV has been making its rounds through the Asian landscape and came to India this year. Interest in computer ...
Continue reading
ACCV has been making its rounds through the Asian landscape and came to India this year. Interest in computer vision is ...
Continue reading
The privilege of organizing it was shared by three universities: The IT University of Copenhagen, the University of Copenhagen, ...
Continue reading
The privilege of organizing it was shared by three universities: The IT University of Copenhagen, the University of Copenhagen, ...
Continue reading