VI realm between distributed computing and networking, namely, Modeling Biological Networks, Network Security, Algorithmic ...
Lee masThis book constitutes the refereed proceedings of the 7th International Workshop on Distributed Computing, IWDC 2004, held ...
Lee masThis book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ...
Lee masThis book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...
Lee masThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
Lee masThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
Lee masThis book constitutes the refereed proceedings of the 6th Conference on Electronic Governance and Open Society: Challenges ...
Lee masThis book constitutes the refereed proceedings of the 20th International Conference on Embedded Computer Systems: Architectures, ...
Lee masThis book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies ...
Lee masThe book presents mechanisms, protocols, and system architectures to achieve end-to-end Quality-of-Service (QoS) over heterogeneous ...
Lee masEuro-Par is an annual, international conference in Europe, covering all aspects of parallel and distributed processing. These ...
Lee masThis book constitutes the proceedings of the 26th International Conference on Parallel and Distributed Computing, Euro-Par ...
Lee masThis book addresses the challenge of analyzing and understanding the evolutionary dynamics of complex biological systems ...
Lee masFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Lee masThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Lee masThe author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...
Lee masThis volume contains papers presented at the 7th International Conference on Formal Engineering Methods (ICFEM 2005), 1-4 ...
Lee masThis book constitutes the proceedings of the 40th IFIP WG 6.1 International Conference on Formal Techniques for Distributed ...
Lee masFORTE (Formal Techniques for Networked and Distributed Systems) 2005 was sp- sored by Working Group 6.1, Technical Committee ...
Lee mas