This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Continue readingThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue readingSan Lucas Quiaviní Zapotec, an endangered and little-examined indigenous language of Mexico, shows a range of syntactic ...
Continue readingThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue readingReviews of Environmental Contamination and Toxicology attempts to provide concise, critical reviews of timely advances, philosophy, ...
Continue readingThis book is simultaneously a theoretical study in morphosyntax and an in-depth empirical study of Hebrew. Based on Hebrew ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...
Continue reading" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Continue readingT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Continue readingThis volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
Continue readingThese are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...
Continue readingSAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Continue readingThis book provides an overview of the ever-growing phenomenon of children in shared physical custody thereby providing legal, ...
Continue readingShort-period binaries run the gamut from widely separated stars to black-hole pairs; in between are systems that include ...
Continue readingSmart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
Continue readingDescribes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with ...
Continue readingMillions of people participate in sporting activities every day, from the daily runner to the three-times-a-week "gym rat," ...
Continue readingThis volume contains the papers presented at the 13th International Symposium on String Processing and Information Retrieval ...
Continue reading1 Introduction The plexuses of Auerbach and Meissner are peculiar to the gut; they extend from the beginning of the unstriated ...
Continue readingThis is the first comprehensive source of information about Mexican fossils to be published in English. The book offers updated ...
Continue reading