Theory of Computation is a unique textbook that serves the dual purposes of covering core material in the foundations of ...
Lire la suiteTCC 2007, the Fourth Theory of Cryptography Conference, was held in Amsterdam, The Netherlands, from February 21 to 24, 2007, ...
Lire la suiteThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Lire la suiteReports on recent developments in the theory of evolutionary computation, or more generally the domain of randomized search ...
Lire la suiteA new calculation method is presented for heat transfer in coupled convective-conductive fluid-wall systems under periodical ...
Lire la suiteThis book focus on theoretical aspects of quantum computation, quantum communication, and quantum cryptography, which are ...
Lire la suiteThis book discusses mathematical models that are based on the concepts of classical equilibrium thermodynamics. They are ...
Lire la suiteIntense global competition in manufacturing has compelled manufacturers to incorporate repetitive processing and automation ...
Lire la suiteThyroid Cytopathology uses a simple algorithmic approach to the diagnosis of thyroid fine needle aspirations (FNA). This ...
Lire la suiteTime-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Lire la suiteCoverage includes software verification, probabilistic model checking and markov chains, automata-based model checking, security, ...
Lire la suiteThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Lire la suiteThis year it comprised ?ve conferences (CC, ESOP, FASE, FOSSACS, TACAS), 17 satellite workshops (AVIS, BYTECODE, CEES, CLASE, ...
Lire la suiteThis book constitutes the refereed proceedings of the 12th International Conference on Tools and Algorithms for the Construction ...
Lire la suiteThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Lire la suiteIn this book, an international team of highly qualified experts treats important topics in acoustic echo and noise control ...
Lire la suiteThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suiteLeading experts have contributed survey and research papers in the areas of Algebraic Combinatorics, Combinatorial Number ...
Lire la suiteThis is a nicely edited volume on Estimation of Distribution Algorithms (EDAs) by leading researchers on this important topic.
Lire la suiteThis research monograph proposes a unified, cross-fertilizing approach for knowledge-representation and modeling based on ...
Lire la suite