Electronic Books

Total Books: 161 - 180 /187
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

Lee mas
Selected Areas in Cryptography ; 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...

Lee mas
Stabilization, Safety, and Security of Distributed Systems

This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security ...

Lee mas
Stabilization, Safety, and Security of Distributed Systems : 10th International Symposium, SSS 2008, Detroit, MI, USA, November 21-23, 2008. Proceedings

The book addresses all safety and security-related aspects of self-stabilizing systems in various areas of distributed computing ...

Lee mas
Structural Information and Communication Complexity : 15th International Colloquium, SIROCCO 2008 Villars-sur-Ollon, Switzerland, June 17-20, 2008 Proceedings

This book cover topics such as distributed algorithms, compact data structures, information dissemination, informative labeling ...

Lee mas
NoIMG
Sublinear Computation Paradigm : Algorithmic Revolution in the Big Data Era

This book gives an overview of cutting-edge work on a new paradigm called the "sublinear computation paradigm," which was ...

Lee mas
The Algorithm Design Manual

The reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing ...

Lee mas
The Amazing Journey of Reason from DNA to Artificial Intelligence

This book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, ...

Lee mas
Theoretical Aspects of Computing - ICTAC 2008 : 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings

The aim of the colloquium is to bring together practitioners and researchers from academia, industry and government to present ...

Lee mas
Theory and Applications of Models of Computation : 5th International Conference, TAMC 2008, Xi’an, China, April 25-29, 2008. Proceedings

This book cover current issues of all major areas in computer science, mathematics (especially logic) and the physical sciences ...

Lee mas
Theory and Applications of Satisfiability Testing - SAT 2008 : 11th International Conference, SAT 2008, Guangzhou, China, May 12-15, 2008. Proceedings

All current research issues in propositional and quantified Boolean formula satisfiability testing are covered, including ...

Lee mas
Theory of Cryptography

TCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...

Lee mas
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

Lee mas
Theory of Quantum Computation, Communication, and Cryptography : Third Workshop, TQC 2008 Tokyo, Japan, January 30 - February 1, 2008. Revised Selected Papers

This book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...

Lee mas
Time-Dependent Scheduling

Time-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...

Lee mas
Tools and Algorithms for the Construction and Analysis of Systems

This is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...

Lee mas
Tools and Algorithms for the Construction and Analysis of Systems : 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings

The book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...

Lee mas
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Lee mas
Transactions on Computational Systems Biology IX

This book contains four highly detailed papers. The first paper focuses on quantitative aspects of the bgl operon for E.coli. ...

Lee mas
Transactions on Computational Systems Biology X

The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...

Lee mas
Total Books: 161 - 180 /187