Electronic Books

Total Books: 141 - 160 /176
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lee mas
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Lee mas
Recent Advances in Constraints

This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...

Lee mas
Recent Advances in Constraints : 12th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2007 Rocquencourt, France, June 7-8, 2007 Revised Selected Papers

This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...

Lee mas
Reliable Implementation of Real Number Algorithms: Theory and Practice : International Seminar Dagstuhl Castle, Germany, January 8-13, 2006 Revised Papers

The book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...

Lee mas
Research in Computational Molecular Biology : 12th Annual International Conference, RECOMB 2008, Singapore, March 30 - April 2, 2008. Proceedings

This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...

Lee mas
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Lee mas
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Lee mas
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

Lee mas
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

Lee mas
Selected Areas in Cryptography ; 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...

Lee mas
Stabilization, Safety, and Security of Distributed Systems

This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security ...

Lee mas
Stabilization, Safety, and Security of Distributed Systems : 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings

The book addresses all safety and security-related aspects of self-stabilizing systems in various areas of distributed computing ...

Lee mas
Structural Information and Communication Complexity : 15th International Colloquium, SIROCCO 2008 Villars-sur-Ollon, Switzerland, June 17-20, 2008 Proceedings

This book cover topics such as distributed algorithms, compact data structures, information dissemination, informative labeling ...

Lee mas
NoIMG
Sublinear Computation Paradigm : Algorithmic Revolution in the Big Data Era

This book gives an overview of cutting-edge work on a new paradigm called the "sublinear computation paradigm," which was ...

Lee mas
The Algorithm Design Manual

The reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing ...

Lee mas
The Amazing Journey of Reason from DNA to Artificial Intelligence

This book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, ...

Lee mas
Theoretical Aspects of Computing - ICTAC 2008 : 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings

The aim of the colloquium is to bring together practitioners and researchers from academia, industry and government to present ...

Lee mas
Theory and Applications of Models of Computation : 5th International Conference, TAMC 2008, Xi’an, China, April 25-29, 2008. Proceedings

This book cover current issues of all major areas in computer science, mathematics (especially logic) and the physical sciences ...

Lee mas
Theory and Applications of Satisfiability Testing - SAT 2008 : 11th International Conference, SAT 2008, Guangzhou, China, May 12-15, 2008. Proceedings

All current research issues in propositional and quantified Boolean formula satisfiability testing are covered, including ...

Lee mas
Total Books: 141 - 160 /176