Electronic Books

Total Books: 141 - 160 /187
Pillars of Computer Science : Essays Dedicated to Boris (Boaz) Trakhtenbrot on the Occasion of His 85th Birthday

This festschrift volume is dedicated to Boris (Boaz) Trakhtenbrot on the occasion of his 85th birthday. For over half a century, ...

Lire la suite
Pixelization Paradigm

The pixelization paradigm states as a postulate that pixelization methods are rich and are worth exploring as far as possible. ...

Lire la suite
Post-Quantum Cryptography : Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 Proceedings

The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are ...

Lire la suite
Practical Problems in VLSI Physical Design Automation

Practical Problems in VLSI Physical Design Automation contains problems and solutions related to various well-known algorithms ...

Lire la suite
Practice and Theory of Automated Timetabling VI

This volume contains a selection of the papers presented at the Sixth Int- national Conference on the Practice and Theory ...

Lire la suite
Pro TBB : C++ Parallel Programming with Threading Building Blocks

This book is a modern guide for all C++ programmers to learn Intel Threading Building Blocks (TBB).this book reflects their ...

Lire la suite
Probabilistic Inductive Logic Programming : Theory and Applications

One of the key open questions within arti?cial intelligence is how to combine probability and logic with learning. This question ...

Lire la suite
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

Lire la suite
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

Lire la suite
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lire la suite
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lire la suite
Public Key Infrastructure : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008 Proceedings

This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...

Lire la suite
Recent Advances in Constraints

This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...

Lire la suite
Recent Advances in Constraints : 12th Annual ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP 2007 Rocquencourt, France, June 7-8, 2007 Revised Selected Papers

This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...

Lire la suite
Reliable Implementation of Real Number Algorithms: Theory and Practice : International Seminar Dagstuhl Castle, Germany, January 8-13, 2006 Revised Papers

The book was inteded to stimulate an exchange of ideas between the different communities that deal with the problem of reliable ...

Lire la suite
Research in Computational Molecular Biology : 12th Annual International Conference, RECOMB 2008, Singapore, March 30 - April 2, 2008. Proceedings

This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular ...

Lire la suite
Runtime Verification : 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers

The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...

Lire la suite
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Lire la suite
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Lire la suite
Security and Privacy in Ad-hoc and Sensor Networks

You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...

Lire la suite
Total Books: 141 - 160 /187