Electronic Books

Total Books: 181 - 200 /272
Pattern Recognition and Artificial Intelligence

This book constitutes the refereed proceedings of the Third Mediterranean Conference on Pattern Recognition and Artificial ...

Lee mas
Peer-to-Peer Systems III

On February 26–27, 2004, the 3rd International Workshop on Peer-to-Peer S- tems (IPTPS 2004) brought researchers and practitioners ...

Lee mas
Performability Has its Price

This volume of the Lecture Notes in Computer Science series publishes the set of papers accepted for the ICQT 2006 workshop, ...

Lee mas
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Lee mas
Preclinical MRI of the Kidney Methods and Protocols

This book provides readers with an open access protocol collection and wide-ranging recommendations for preclinical renal ...

Lee mas
Principles of Protocol Design

Introduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...

Lee mas
Program Analysis and Compilation. Theory and Practice

This Festschrift volume publishing to honor Reinhard Wilhelm on his 60th Birthday on June 10, 2006, includes 15 refereed ...

Lee mas
Progress in Artificial Intelligence

This book constitutes the refereed proceedings of the 20th EPIA Conference on Artificial Intelligence, EPIA 2021, held virtually ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lee mas
Progress in Cryptology - AFRICACRYPT 2020 : 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...

Lee mas
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

Lee mas
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

Lee mas
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

Lee mas
Progress in Cryptology - VIETCRYPT 2006

The papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...

Lee mas
Progress in Cryptology – Mycrypt 2005

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...

Lee mas
Protocols for High Speed Networks

This workshop on “Protocols for High-Speed Networks” is the seventh in a s- cessful series of international workshops, ...

Lee mas
Provable Security

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...

Lee mas
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lee mas
Real-Time Mobile Multimedia Services

This book constitutes the refereed proceedings of the 10th IFIP/IEEE International Conference on Management of Multimedia ...

Lee mas
Real-time Communication Protocols for Multi-hop Ad-hoc Networks : Wireless Networking in Production and Control Systems

This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) ...

Lee mas
Total Books: 181 - 200 /272