This book cover theory, practice, applications, and experiences related to secure software.
Lire la suiteThis book cover theory, practice, applications, and experiences related to secure software.
Lire la suiteThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suiteThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suiteThis book Covering hardware and software techniques for state-of-the-art multicore and multithreaded architectures.
Lire la suiteThis book Covering hardware and software techniques for state-of-the-art multicore and multithreaded architectures.
Lire la suiteThis book constitutes the proceedings of the 2005 Asia-Paci?c Computer Systems Architecture Conference (ACSAC 2005) held ...
Lire la suiteThis book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 27th International ...
Lire la suiteThis book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 25th International ...
Lire la suiteThis book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Lire la suiteThis book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Lire la suiteThe book is a compilation of recent research results on building construction materials. The construction industry consumes ...
Lire la suiteCovers topics on both theoretical control systems and their applications across engineering domains such as automatic control, ...
Lire la suiteEach year, the International Conference on Cooperative Control and Optimization (CCO) brings together top researchers from ...
Lire la suiteThis book presents a comprehensive and up-to-date collection of knowledge on the state of crowdfunding research and practice. ...
Lire la suiteThis book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
Lire la suiteThis book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
Lire la suiteThis book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held ...
Lire la suiteThe book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Lire la suiteThe book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Lire la suite