Reports on recent developments in the theory of evolutionary computation, or more generally the domain of randomized search ...
Lire la suiteThis book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
Lire la suiteThis edition guides the reader through successful planning and implementation of a thesis project and provides students in ...
Lire la suiteYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Lire la suiteThis two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction ...
Lire la suiteThis book set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction ...
Lire la suiteThis is Part I: SAT and SMT, SAT solving and theorem proving; verification and analysis; model checking; tool demo; and machine ...
Lire la suiteThis is Part II: contiants Tools and Algorithms for the Construction and Analysis of Systems
Lire la suiteThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suiteProvides a self-contained presentation of the foundations of finite fields, including a detailed treatment of their algebraic ...
Lire la suiteThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Lire la suiteTowards Next Generation Grids is the fifth volume of the CoreGRID series. Organized jointly with the Euro-Par 2007 conference, ...
Lire la suiteThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
Lire la suiteTransactions on Computational Science II is devoted to the subject of denotational mathematics for computational intelligence. ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suiteTransactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
Lire la suiteTopics of interest include model driven architecture, enterprise development environments, service oriented architecture, ...
Lire la suiteWhat do you do when your database application isn't running fast enough? You troubleshoot, of course. Finding the slow part ...
Lire la suiteWritten for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Lire la suiteThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Lire la suite