0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (5)
  • R250 - R500 (51)
  • R500+ (5,301)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Graph-Theoretic Concepts in Computer Science - 40th International Workshop, WG 2014, Nouan-le-Fuzelier, France, June 25-27,... Graph-Theoretic Concepts in Computer Science - 40th International Workshop, WG 2014, Nouan-le-Fuzelier, France, June 25-27, 2014. Revised Selected Papers (Paperback, 2014 ed.)
Dieter Kratsch, Ioan Todinca
R2,513 Discovery Miles 25 130 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 40th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2014, held in Nouan-le-Fuzelier, France, in June 2014. The 32 revised full papers presented were carefully reviewed and selected from 80 submissions. The book also includes two invited papers. The papers cover a wide range of topics in graph theory related to computer science, such as design and analysis of sequential, parallel, randomized, parameterized and distributed graph and network algorithms; structural graph theory with algorithmic or complexity applications; computational complexity of graph and network problems; graph grammars, graph rewriting systems and graph modeling; graph drawing and layouts; computational geometry; random graphs and models of the web and scale-free networks; and support of these concepts by suitable implementations and applications.

Java: Data Structures and Programming (Paperback, Softcover reprint of the original 1st ed. 1998): Liwu Li Java: Data Structures and Programming (Paperback, Softcover reprint of the original 1st ed. 1998)
Liwu Li
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

This introduction to the Java language integrates a discussion of object-oriented programming with the design and implementation of data structures. It covers the most important topics, including algorithm analysis; time and space complexities; Java built-in data structure classes; input and output, data, and access streams; and the persistency of data.

Summarizing Information - Including CD-ROM "SimSum", Simulation of Summarizing, for Macintosh and Windows (Paperback, Softcover... Summarizing Information - Including CD-ROM "SimSum", Simulation of Summarizing, for Macintosh and Windows (Paperback, Softcover reprint of the original 1st ed. 1998)
Brigitte Endres-Niggemeyer
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

This monograph summarizes what we know about summarizing, and offers a detailed analysis of professional summarizing. A computer simulation of the cognitive processes in expert summarizers is offered on the accompanying CD-ROM.

Pattern Recognition in Bioinformatics - 8th IAPR International Conference, PRIB 2013, Nice, France, June 17-20, 2013.... Pattern Recognition in Bioinformatics - 8th IAPR International Conference, PRIB 2013, Nice, France, June 17-20, 2013. Proceedings (Paperback, 2013 ed.)
Alioune Ngom, Enrico Formenti, Jin-Kao Hao, Xing-Ming Zhao, Twan van Laarhoven
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th IAPR International Conference on Pattern Recognition in Bioinformatics, PRIB 2013, held in Nice, France, in June 2013. The 25 revised full papers presented were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on bio-molecular networks and pathway analysis; learning, classification, and clustering; data mining and knowledge discovery; protein: structure, function, and interaction; motifs, sites, and sequence analysis.

Biometric Recognition - 9th Chinese Conference on Biometric Recognition, CCBR 2014, Shenyang, China, November 7-9, 2014.... Biometric Recognition - 9th Chinese Conference on Biometric Recognition, CCBR 2014, Shenyang, China, November 7-9, 2014. Proceedings (Paperback, 2014 ed.)
Zhenan Sun, Shiguang Shan, Haifeng Sang, Jie Zhou, Yunhong Wang, …
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th Chinese Conference on Biometric Recognition, CCBR 2014, held in Shenyang, China, in November 2014. The 60 revised full papers presented were carefully reviewed and selected from among 90 submissions. The papers focus on face, fingerprint and palmprint, vein biometrics, iris and ocular biometrics, behavioral biometrics, application and system of biometrics, multi-biometrics and information fusion, other biometric recognition and processing.

Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference,... Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th InternationalWorkshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings (Paperback, 2014 ed.)
Stephanie Teufel, Tjoa A Min, Illsun You, Edgar Weippl
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.

Networked Systems - Second International Conference, NETYS 2014, Marrakech, Morocco, May 15-17, 2014. Revised Selected Papers... Networked Systems - Second International Conference, NETYS 2014, Marrakech, Morocco, May 15-17, 2014. Revised Selected Papers (Paperback, 2014 ed.)
Guevara Noubir, Michel Raynal
R2,322 Discovery Miles 23 220 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.

Tools for High Performance Computing 2011 - Proceedings of the 5th International Workshop on Parallel Tools for High... Tools for High Performance Computing 2011 - Proceedings of the 5th International Workshop on Parallel Tools for High Performance Computing, September 2011, ZIH, Dresden (Paperback, 2012 ed.)
Holger Brunst, Matthias S. Muller, Wolfgang E. Nagel, Michael M Resch
R2,620 Discovery Miles 26 200 Ships in 18 - 22 working days

The proceedings of the 5th International Workshop on Parallel Tools for High Performance Computing provide an overview on supportive software tools and environments in the fields of System Management, Parallel Debugging and Performance Analysis. In the pursuit to maintain exponential growth for the performance of high performance computers the HPC community is currently targeting Exascale Systems. The initial planning for Exascale already started when the first Petaflop system was delivered. Many challenges need to be addressed to reach the necessary performance. Scalability, energy efficiency and fault-tolerance need to be increased by orders of magnitude. The goal can only be achieved when advanced hardware is combined with a suitable software stack. In fact, the importance of software is rapidly growing. As a result, many international projects focus on the necessary software.

Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings... Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013, Proceedings (Paperback, 2013 ed.)
Emiliano De Cristofaro, Matthew Wright
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Symposium on Privacy Enhancing Technologies, PET 2013, held in Bloomington, IN, USA, in July 2013.
The 13 full papers presented were carefully selected from 69
submissions. Topics addressed include data privacy, privacy-oriented
cryptography, location privacy, performance of the Tor network,
censorship evasion, traffc analysis, and user-related privacy
perspectives.

Theory and Applications of Satisfiability Testing - SAT 2013 - 16th International Conference, Helsinki, Finland, July 8-12,... Theory and Applications of Satisfiability Testing - SAT 2013 - 16th International Conference, Helsinki, Finland, July 8-12, 2013, Proceedings (Paperback, 2013 ed.)
Matti Jarvisalo, Allen Van Gelder
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th International Conference on Theory and Applications of Satisfiability Testing, SAT 2013, held in Helsinki, Finland in July 2013. The 21 regular papers, 5 short papers, and 5 tool papers presented together with 3 invited talks were carefully reviewed and selected from 71 submissions (850 regular, 15 short and 16 tool papers). The focus of the papers in on following topics: maximum satisfiability, encodings and applications, solver techniques and algorithms, clique-width and SAT, propositional proof complexity, parameterized complexity.

Web-Age Information Management - WAIM 2013 International Workshops: HardBD, MDSP, BigEM, TMSN, LQPM, BDMS, Beidaihe, China,... Web-Age Information Management - WAIM 2013 International Workshops: HardBD, MDSP, BigEM, TMSN, LQPM, BDMS, Beidaihe, China, June 14-16, 2013. Proceedings (Paperback, 2013 ed.)
Yunjun Gao, Kyuseok Shim, Zhiming Ding, Peiquan Jin, Ren Zujie, …
R1,445 Discovery Miles 14 450 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).

Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings... Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings (Paperback, 2013 ed.)
Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.

Frontiers in Algorithmics and Algorithmic Aspects in Information and Management - Third Joint International Conference,... Frontiers in Algorithmics and Algorithmic Aspects in Information and Management - Third Joint International Conference, FAW-AAIM 2013, Dalian,China, June 26-28, 2013, Proceedings (Paperback, 2013 ed.)
Michael Fellows, Xuehou Tan, Binhai Zhu
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Frontiers of Algorithmics Workshop, FAW 2013, and the 9th International Conference on Algorithmic Aspects in Information and Management, AAIM 2013, jointly held in Dalian, China, in June 2013.
The 33 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 60 submissions. The Joint Conference provide a focused forum on current trends of research on algorithms, discrete structures, operation research, combinatorial optimization and their applications, and will bring together international experts at the research frontiers in these areas to exchange ideas and to present significant new results. The mission of the Joint Conference is to stimulate the various fields for which algorithmics can become a crucial enabler, and to strengthen the ties between the Eastern and Western research communities of algorithmics and applications.

Computational Collective Intelligence -- Technologies and Applications - 6th International Conference, ICCCI 2014, Seoul,... Computational Collective Intelligence -- Technologies and Applications - 6th International Conference, ICCCI 2014, Seoul, Korea, September 24-26, 2014, Proceedings (Paperback, 2014 ed.)
Dosam Hwang, Jason J. Jung, Ngoc Thanh Nguyen
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Collective Intelligence, ICCCI 2014, held in Seoul, Korea, in September 2014. The 70 full papers presented were carefully reviewed and selected from 205 submissions. They address topics such as knowledge integration, data mining for collective processing, fuzzy, modal and collective systems, nature inspired systems, language processing systems, social networks and semantic web, agent and multi-agent systems, classification and clustering methods, multi-dimensional data processing, Web systems, intelligent decision making, methods for scheduling, image and video processing, collective intelligence in web systems, computational swarm intelligence, cooperation and collective knowledge.

Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014,... Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings (Paperback, 2014 ed.)
Radha Poovendran, Walid Saad
R2,407 Discovery Miles 24 070 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.

Swarm Intelligence - 9th International Conference, ANTS 2014, Brussels, Belgium, September 10-12, 2014. Proceedings (Paperback,... Swarm Intelligence - 9th International Conference, ANTS 2014, Brussels, Belgium, September 10-12, 2014. Proceedings (Paperback, 2014 ed.)
Marco Dorigo, Mauro Birattari, Simon Garnier, Heiko Hamann, Marco Montes de Oca, …
R2,174 Discovery Miles 21 740 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th International Conference on Swarm Intelligence, held in Brussels, Belgium, in September 2014. This volume contains 17 full papers, 9 short papers, and 7 extended abstracts carefully selected out of 55 submissions. The papers cover empirical and theoretical research in swarm intelligence such as: behavioral models of social insects or other animal societies, ant colony optimization, particle swarm optimization, swarm robotics systems.

Intelligent Computing Methodologies - 10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014, Proceedings... Intelligent Computing Methodologies - 10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014, Proceedings (Paperback, 2014 ed.)
De-shuang Huang, Kang-Hyun Jo, Ling Wang
R1,567 Discovery Miles 15 670 Ships in 18 - 22 working days

This book - in conjunction with the volumes LNCS 8588 and LNBI 8590 - constitutes the refereed proceedings of the 10th International Conference on Intelligent Computing, ICIC 2014, held in Taiyuan, China, in August 2014. The 85 papers of this volume were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections such as soft computing; artificial bee colony algorithms; unsupervised learning; kernel methods and supporting vector machines; machine learning; fuzzy theory and algorithms; image processing; intelligent computing in computer vision; intelligent computing in communication networks; intelligent image/document retrievals; intelligent data analysis and prediction; intelligent agent and Web applications; intelligent fault diagnosis; knowledge representation/reasoning; knowledge discovery and data mining; natural language processing and computational linguistics; next gen sequencing and metagenomics; intelligent computing in scheduling and engineering optimization; advanced modeling, control and optimization techniques for complex engineering systems; complex networks and their applications; time series forecasting and analysis using artificial neural networks; computer human interaction using multiple visual cues and intelligent computing; biometric system and security for intelligent computing.

Algorithms for Computational Biology - First International Conference, AlCoB 2014, Tarragona, Spain, July 1-3, 2014,... Algorithms for Computational Biology - First International Conference, AlCoB 2014, Tarragona, Spain, July 1-3, 2014, Proceedings (Paperback, 2014 ed.)
Adrian Horia Dediu, Carlos Martin-Vide, Bianca Truthe
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference, AlCoB 2014, held in July 2014 in Tarragona, Spain.

The 20 revised full papers were carefully reviewed and selected from 39 submissions. The scope of AlCoB includes topics of either theoretical or applied interest, namely: exact sequence analysis, approximate sequence analysis, pairwise sequence alignment, multiple sequence alignment, sequence assembly, genome rearrangement, regulatory motif finding, phylogeny reconstruction, phylogeny comparison, structure prediction, proteomics: molecular pathways, interaction networks, transcriptomics: splicing variants, isoform inference and quantification, differential analysis, next-generation sequencing: population genomics, metagenomics, metatranscriptomics, microbiome analysis, systems biology.

Asynchronous System-on-Chip Interconnect (Paperback, Softcover reprint of the original 1st ed. 2002): John Bainbridge Asynchronous System-on-Chip Interconnect (Paperback, Softcover reprint of the original 1st ed. 2002)
John Bainbridge
R1,371 Discovery Miles 13 710 Ships in 18 - 22 working days

Asynchronous System-on-Chip Interconnect describes the use of an entirely asynchronous system-bus for the modular construction of integrated circuits. Industry is just awakening to the benefits of asynchronous design in avoiding the problems of clock-skew and multiple clock-domains, an din parallel with this is coming to grips with Intellectual Property (IP) based design flows which emphasise the need for a flexible interconnect strategy. In this book, John Bainbridge investigates the design of an asynchronous on-chip interconnect, looking at all the stages of the design from the choice of wiring layout, through asynchronous signalling protocols to the higher level problems involved in supporting split transactions. The MARBLE bus (the first asynchronous SoC bus) used in a commercial demonstrator chip containing a mixture of asynchronous and synchronous macrocells is used as a concrete example throughout the book.

Developments in Language Theory - 18th International Conference, DLT 2014, Ekaterinburg, Russia, August 26-29, 2014.... Developments in Language Theory - 18th International Conference, DLT 2014, Ekaterinburg, Russia, August 26-29, 2014. Proceedings (Paperback, 2014 ed.)
Arseny M. Shur, Mikhail V. Volkov
R2,333 Discovery Miles 23 330 Ships in 18 - 22 working days

This book constitutes the proceedings of the 18th International Conference on Developments in Language Theory, DLT 2014, held in Ekaterinburg, Russia, in August 2014. The 22 full papers and 5 short papers presented together with 3 invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical subjects on Grammars, Acceptors and Transducers for Words, Trees and Graphs, Algebraic Theories of Automata, Algorithmic, Combinatorial and Algebraic Properties of Words and Languages, Variable Length Codes, Symbolic Dynamics, Cellular Automata, Polyominoes and Multidimensional Patterns, Decidability Questions, Image Manipulation and Compression, Efficient Text Algorithms, Relationships to Cryptography, Concurrency, Complexity Theory and Logic, Bio-Inspired Computing and Quantum Computing.

Advances in Swarm Intelligence - 4th International Conference, ICSI 2013, Harbin, China, June 12-15, 2013, Proceedings, Part I... Advances in Swarm Intelligence - 4th International Conference, ICSI 2013, Harbin, China, June 12-15, 2013, Proceedings, Part I (Paperback, 2013 ed.)
Ying Tan, Yuhui Shi, Hongwei Mo
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days

This book and its companion volume, LNCS vols. 7928 and 7929 constitute the proceedings of the 4th International Conference on Swarm Intelligence, ICSI 2013, held in Harbin, China in June 2013. The 129 revised full papers presented were carefully reviewed and selected from 268 submissions. The papers are organized in 22 cohesive sections covering all major topics of swarm intelligence research and developments. The following topics are covered in this volume: analysis of swarm intelligence based algorithms, particle swarm optimization, applications of particle swarm optimization algorithms, ant colony optimization algorithms, biogeography-based optimization algorithms, novel swarm-based search methods, bee colony algorithms, differential evolution, neural networks, fuzzy methods, evolutionary programming and evolutionary games.

Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014,... Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Juan A. Garay, Rosario Gennaro
R2,925 Discovery Miles 29 250 Ships in 18 - 22 working days

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Pervasive Computing and the Networked World - Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, December... Pervasive Computing and the Networked World - Joint International Conference, ICPCA/SWS 2013, Vina del Mar, Chile, December 5-7, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Qiaohong Zu, Maria Vargas-Vera, Bo Hu
R1,558 Discovery Miles 15 580 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Joint International Conference on Pervasive Computing and Web Society, ICPCA/SWS 2013, held in Vina de Mar, Chile, in December 2013. The 56 revised full papers presented together with 29 poster papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on infrastructure and devices; service and solution; data and knowledge; as well as community.

Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014,... Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Juan A. Garay, Rosario Gennaro
R2,819 Discovery Miles 28 190 Ships in 18 - 22 working days

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Graph Algorithms (Hardcover, 2nd Revised edition): Shimon Even Graph Algorithms (Hardcover, 2nd Revised edition)
Shimon Even; Edited by Guy Even
R2,380 Discovery Miles 23 800 Ships in 10 - 15 working days

Shimon Even's Graph Algorithms, published in 1979, was a seminal introductory book on algorithms read by everyone engaged in the field. This thoroughly revised second edition, with a foreword by Richard M. Karp and notes by Andrew V. Goldberg, continues the exceptional presentation from the first edition and explains algorithms in a formal but simple language with a direct and intuitive presentation. The book begins by covering basic material, including graphs and shortest paths, trees, depth-first-search and breadth-first search. The main part of the book is devoted to network flows and applications of network flows, and it ends with chapters on planar graphs and testing graph planarity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Teaching Science - Foundation To Senior…
Robyn Gregson, Marie Botha Paperback R610 Discovery Miles 6 100
Changing the Score - Arias, Prima…
Hilary Poriss Hardcover R1,803 Discovery Miles 18 030
Aspects of Learning (RLE Edu O)
Brian O'Connell Hardcover R4,199 Discovery Miles 41 990
Java - The ultimate beginners guide to…
Mark Reed Hardcover R564 R519 Discovery Miles 5 190
Hacking - A Comprehensive Guide to…
Sam Griffin Hardcover R554 R509 Discovery Miles 5 090
A Practical Introduction to Fuzzy Logic…
Luis Arguelles Mendez Hardcover R4,297 R3,496 Discovery Miles 34 960
Schoenberg's New World - The American…
Sabine Feisst Hardcover R1,471 Discovery Miles 14 710
How to Cheat at Configuring VmWare ESX…
David Rule Paperback R1,084 R842 Discovery Miles 8 420
Real-time Systems Scheduling Volume 1
Chetto Hardcover R3,775 Discovery Miles 37 750
Methods and Models in Mathematical…
S.A. MirHassani, F. Hooshmand Hardcover R2,710 Discovery Miles 27 100

 

Partners