In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...
Lire la suiteAccessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...
Lire la suiteCombinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...
Lire la suiteThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Lire la suiteThis book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...
Lire la suiteETAPS 2006 was the ninth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual ...
Lire la suiteThis book constitutes the proceedings of the 17th International Conference on Compiler Construction, CC 2008. It covers analysis ...
Lire la suiteThis book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...
Lire la suiteComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Lire la suiteThe purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...
Lire la suiteEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Lire la suiteEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Lire la suiteConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Lire la suiteThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Lire la suiteA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Lire la suiteThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Lire la suiteThis book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...
Lire la suiteConstitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suite