Electronic Books

Total Books: 641 - 660 /1829
Data and Applications Security XX

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...

Lee mas
Database Programming Languages

This volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...

Lee mas
Database Programming Languages

This volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...

Lee mas
Database Systems for Advanced Applications (vol. # 3882)

This book constitutes the refereed proceedings of the 11th International Conference on Database Systems for Advanced Applications, ...

Lee mas
Database Systems for Advanced Applications : 13th International Conference, DASFAA 2008, New Delhi, India, March 19-21, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th International Conference on Database Systems for Advanced Applications, ...

Lee mas
Database Theory - ICDT 2005

This volume collects the papers presented at the 10th International Conference on Database Theory, ICDT 2005, held during ...

Lee mas
Database Theory – ICDT 2007

The papers are organized in topical sections on information integration and peer to peer, axiomatizations for XML, expressive ...

Lee mas
Database and XML Technologies (vol. # 3671)

Constitutes the proceedings of the Third International XML Database Symposium, XSym 2005, held in Trondheim, Norway in August ...

Lee mas
Databases in Networked Information Systems

This book constitutes the refereed proceedings of the 4th International Workshop on Databases in Networked Information Systems, ...

Lee mas
Decision Procedures : An Algorithmic Point of View

The book concentrates on decision procedures for first-order theories that are commonly used in automated verification and ...

Lee mas
Decomposition Techniques in Mathematical Programming

This textbook for students and practitioners presents a practical approach to decomposition techniques in optimization. It ...

Lee mas
Deep Learning for Computational Problems in Hardware Security : Modeling Attacks on Strong Physically Unclonable Function Circuits / Pranesh Santikellur, Rajat Subhra Chakraborty

Discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...

Lee mas
Deep Statistical Comparison for Meta-heuristic Stochastic Optimization Algorithms / Tome Eftimov, Peter Korošec

Presents a comprehensive comparison of the performance of stochastic optimization algorithms Includes an introduction to ...

Lee mas
NoIMG
Deep fake detection / Malek Sharaf Al-Deen ; Ali Issa ; Abdullah Tellawi ; Ahmad Jamal Al-Deen

Deep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...

Lee mas
Deformable Models

Deformable Models: Biomedical and Clinical Applications is the first entry in the two-volume set which provides a wide cross-section ...

Lee mas
Deontic Logic and Artificial Normative Systems

This volume presents the papers contributed to DEON 2006, the 8th Inter- tional Workshop on Deontic Logic in Computer Science, ...

Lee mas
Dependable Computing

This book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...

Lee mas
Dependable Computing

Contains the proceedings of the 'Second Latin-American Symposium' on Dependable Computing, LADC 2005. This book comprises ...

Lee mas
Dependable Computing

This book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...

Lee mas
Dependable Systems: Software, Computing, Networks

The present volume documents the results of a research program on Dependable Information and Communication Systems (DICS). ...

Lee mas
Total Books: 641 - 660 /1829