Electronic Books

Total Books: 201 - 207 /207
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lire la suite
VR Technologies in Cultural Heritage

Tthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...

Lire la suite
Verification, Model Checking, and Abstract Interpretation

This volume contains the papers presented at VMCAI 2007: Verification, Model Checking and Abstract Interpretation held January ...

Lire la suite
Verification, Model Checking, and Abstract Interpretation (vol. # 3385)

The 27 revised full papers presented here, together with one invited paper were carefully reviewed and selected from 58 submissions. ...

Lire la suite
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Lire la suite
VizSEC 2007 : Proceedings of the Workshop on Visualization for Computer Security

Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...

Lire la suite
WALCOM: Algorithms and Computation : Second International Workshop, WALCOM 2008, Dhaka, Bangladesh, February 7-8, 2008. Proceedings

This book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...

Lire la suite
Total Books: 201 - 207 /207