In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...
Lee masAccessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...
Lee masCombinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...
Lee masThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Lee masThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Lee masETAPS 2006 was the ninth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual ...
Lee masThis book constitutes the proceedings of the 17th International Conference on Compiler Construction, CC 2008. It covers analysis ...
Lee masThis book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...
Lee masComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Lee masThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Lee masEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Lee masEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Lee masConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Lee masThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Lee masThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Lee masA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Lee masThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Lee masThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Lee masConstitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
Lee masCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lee mas