Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand ...
Continue reading
Sudoku is a wildly popular puzzle game. Sudoku puzzles are 9x9 grids, and each square in the grid consists of a 3x3 subgrid ...
Continue readingThis book presents computer programming as a key method for solving mathematical problems. There are two versions of the ...
Continue reading
This book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received ...
Continue readingThis book presents computer programming as a key method for solving mathematical problems. There are two versions of the ...
Continue reading
With this edition, EPIA, the Portuguese Conference on Arti?cial Intelligence, celebrates its 20th anniversary.Like all its ...
Continue reading
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue reading
CIARP 2005 (10th Iberoamerican Congress on Pattern Recognition, X CIARP) is the 10th event in the series of pioneer congresses ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
The goal of this volume is to prove that mixed utterances in young bilinguals can be analyzed in the same way as adult code-switching. ...
Continue reading
This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
Continue reading
This book presents the author’s new method of two-stage maximization of likelihood function, which helps to solve a series ...
Continue reading
This book deals with the effect of public and semi-public companies on economy. In traditional economic models, several private ...
Continue reading
This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Continue reading
This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...
Continue reading
This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue reading
To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
Continue reading
Pulling Strings with Puppet: Configuration Management Made Easy is the first book to introduce the powerful Puppet system ...
Continue reading
The concepts and theories of knowledge management and networks are meanwhile well documented. Yet there are few, if any, ...
Continue reading
This book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...
Continue reading