This book provides substantial new results in a novel field of research examining the syntactic and semantic consequences ...
Lire la suiteThis collection is an important contribution to the semantic and syntactic analysis of the expression of existence. The volume ...
Lire la suiteThe book presents an introduction to the project, exhibits partners’ methods and approaches, and provides comprehensive ...
Lire la suiteThis project is an AI fashion design system to generate fashion images based on user textual description. The proposed system ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Lire la suiteFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Lire la suiteThe sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Lire la suiteHow do we think about architecture historically and theoretically? Forty Ways to Think about Architecture provides an introduction ...
Lire la suiteThis book encompass the principl results of field investigations, analyses of meso-scale and micro-scale textures and structures, ...
Lire la suiteThe increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...
Lire la suiteThis book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...
Lire la suiteSynthesizing high-quality images from text descriptions is a challenging problem in computer vision and has many practical ...
Lire la suiteThis book contains a structured collection of complete solutions of all significant axially symmetric contact problems. It ...
Lire la suitePresents a comprehensive and up-to-date account of the theory (physical principles), design, and practical implementations ...
Lire la suiteThis volume is the 8th in a series of impact books resulting from the activities of the scientific program "Response of ...
Lire la suiteThis book provides an in-depth description of the framework of inductive dependency parsing, a methodology for robust and ...
Lire la suiteThe 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...
Lire la suiteThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
Lire la suiteThe ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
Lire la suite