This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
Lire la suiteThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Lire la suiteThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Lire la suiteTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the 8th International Conference on Data Management Technologies ...
Lire la suiteThis book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
Lire la suiteData Mining and Knowledge Discovery Handbook organizes all major concepts, theories, methodologies, trends, challenges and ...
Lire la suiteThis two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference of Pioneering ...
Lire la suiteThis two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
Lire la suiteThis volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...
Lire la suiteThe double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
Lire la suiteThis book constitutes the refereed proceedings of the 14th International Baltic Conference on Databases and Information Systems, ...
Lire la suiteThe book concentrates on decision procedures for first-order theories that are commonly used in automated verification and ...
Lire la suiteThe second edition of the workshop on Declarative Agent Languages and Te- nologies (DALT 2004) was held July 2004 in New ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Declarative Agent Languages ...
Lire la suiteThis book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Declarative ...
Lire la suitePresents a comprehensive comparison of the performance of stochastic optimization algorithms Includes an introduction to ...
Lire la suiteThe IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
Lire la suiteThis tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
Lire la suiteThis book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have ...
Lire la suite