Electronic Books

Total Books: 141 - 160 /187
Pillars of Computer Science : Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday

This festschrift volume is dedicated to Boris (Boaz) Trakhtenbrot on the occasion of his 85th birthday. For over half a century, ...

Lee mas
Pixelization Paradigm

The pixelization paradigm states as a postulate that pixelization methods are rich and are worth exploring as far as possible. ...

Lee mas
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Lee mas
Practical Problems in VLSI Physical Design Automation

Practical Problems in VLSI Physical Design Automation contains problems and solutions related to various well-known algorithms ...

Lee mas
Practice and Theory of Automated Timetabling VI

This volume contains a selection of the papers presented at the Sixth Int- national Conference on the Practice and Theory ...

Lee mas
Pro TBB : C++ Parallel Programming with Threading Building Blocks

This book is a modern guide for all C++ programmers to learn Intel Threading Building Blocks (TBB).this book reflects their ...

Lee mas
Probabilistic Inductive Logic Programming : Theory and Applications

One of the key open questions within arti?cial intelligence is how to combine probability and logic with learning. This question ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lee mas
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lee mas
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lee mas
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lee mas
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Lee mas
Recent Advances in Constraints

This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...

Lee mas
Recent Advances in Constraints : 12th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2007 Rocquencourt, France, June 7-8, 2007 Revised Selected Papers

This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...

Lee mas
Reliable Implementation of Real Number Algorithms: Theory and Practice : International Seminar Dagstuhl Castle, Germany, January 8-13, 2006 Revised Papers

The book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...

Lee mas
Research in Computational Molecular Biology : 12th Annual International Conference, RECOMB 2008, Singapore, March 30 - April 2, 2008. Proceedings

This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...

Lee mas
Runtime Verification : 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers

The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...

Lee mas
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Lee mas
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Lee mas
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

Lee mas
Total Books: 141 - 160 /187