This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
Lee mas
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Lee masThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Lee masTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Lee mas
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on Data Management Technologies ...
Lee mas
This book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
Lee mas
Data Mining and Knowledge Discovery Handbook organizes all major concepts, theories, methodologies, trends, challenges and ...
Lee mas
This two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Lee mas
This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
Lee mas
This volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...
Lee mas
The double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
Lee mas
This book constitutes the refereed proceedings of the 14th International Baltic Conference on Databases and Information Systems, ...
Lee mas
The book concentrates on decision procedures for first-order theories that are commonly used in automated verification and ...
Lee mas
The second edition of the workshop on Declarative Agent Languages and Te- nologies (DALT 2004) was held July 2004 in New ...
Lee mas
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Declarative Agent Languages ...
Lee mas
This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Declarative ...
Lee mas
Presents a comprehensive comparison of the performance of stochastic optimization algorithms Includes an introduction to ...
Lee mas
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
Lee mas
This tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
Lee mas
This book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have ...
Lee mas