Electronic Books

Total Books: 161 - 176 /176
Theory of Cryptography

TCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...

Lee mas
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

Lee mas
Theory of Quantum Computation, Communication, and Cryptography : Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers

This book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...

Lee mas
Time-Dependent Scheduling

Time-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...

Lee mas
Tools and Algorithms for the Construction and Analysis of Systems

This is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...

Lee mas
Tools and Algorithms for the Construction and Analysis of Systems : 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings

The book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...

Lee mas
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Lee mas
Transactions on Computational Systems Biology IX

This book contains four highly detailed papers. The first paper focuses on quantitative aspects of the bgl operon for E.coli. ...

Lee mas
Transactions on Computational Systems Biology X

The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...

Lee mas
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

Lee mas
Transactions on Petri Nets and Other Models of Concurrency I

It contains teaching concurrency; process languages; process mining; software engineering; state space visualisation techniques; ...

Lee mas
Unconventional Computing : 7th International Conference, UC 2008 Vienna, Austria, August 25-28, 2008. Proceedings

The book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...

Lee mas
Understanding Planning Tasks : Domain Complexity and Heuristic Decomposition

Action planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...

Lee mas
WALCOM: Algorithms and Computation : Second International Workshop, WALCOM 2008, Dhaka, Bangladesh, February 7-8, 2008. Proceedings

This book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...

Lee mas
Wireless Algorithms, Systems, and Applications : Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings

This book address current research and development efforts of various issues in the area of algorithms, systems and applications ...

Lee mas
Wireless Sensor Networks : 5th European Conference, EWSN 2008, Bologna, Italy, January 30-February 1, 2008. Proceedings

This book is organized in topical sections on localization, detection of space/time correlated events, network coding, ZigBee, ...

Lee mas
Total Books: 161 - 176 /176