Electronic Books

Total Books: 41 - 60 /205
Coding for Data and Computer Communications

In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...

Lee mas
Coding for Wireless Channels

Accessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...

Lee mas
Combinatorial Optimization in Communication Networks

Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...

Lee mas
Compiler Construction

This book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...

Lee mas
Compiler Construction

This book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...

Lee mas
Compiler Construction (vol. # 3923)

ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual ...

Lee mas
Compiler Construction : 17th International Conference, CC 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29 - April 6, 2008. Proceedings

This book constitutes the proceedings of the 17th International Conference on Compiler Construction, CC 2008. It covers analysis ...

Lee mas
Computer Safety, Reliability, and Security (vol. # 3688)

This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...

Lee mas
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...

Lee mas
Computer Viruses: from theory to applications

The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...

Lee mas
Cooperative Bug Isolation

Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...

Lee mas
Cooperative Bug Isolation

Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...

Lee mas
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

Lee mas
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

Lee mas
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

Lee mas
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

Lee mas
Data Compression

This book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...

Lee mas
Data Compression

This book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...

Lee mas
Data and Applications Security XIX

Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...

Lee mas
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

Lee mas
Total Books: 41 - 60 /205