This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Lee masThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Lee masThe 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Lee masThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Lee masThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Lee masThe FPGA technology is defined, which includes architecture, logic block structure, interconnect, and configuration methods ...
Lee masThis text provides a very simple, initial introduction to the complete scientific computing pipeline: models, discretization, ...
Lee masThis easy-to-read book introduces the basics of solving partial differential equations by means of finite difference methods. ...
Lee masThis book gives a broad overview of core topics of finite model theory: expressive power, descriptive complexity, and zero-one ...
Lee masThis book gives a broad overview of core topics of finite model theory: expressive power, descriptive complexity, and zero-one ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Finite-State Methods ...
Lee masThis book constitutes the refereed proceeding of the 7th International Conference on Flexible Query Answering Systems, FQAS ...
Lee masThis book constitutes the refereed proceedings of the 23rd British National Conference on Databases, BNCOD 23, held in Belfast, ...
Lee masThis book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop of the Initiative ...
Lee masIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lee masIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lee masIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Lee masForm-based applications range from simple web shops to complex enterprise resource planning systems. Draheim and Weber adapt ...
Lee masThe 3rd Workshop on Formal Approaches to Agent-Based Systems (FAABS-III) was held at the Greenbelt Marriott Hotel (near NASA ...
Lee mas