0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (84)
  • R500+ (1,902)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Digital Transmission - A Simulation-Aided Introduction with VisSim/Comm (Paperback, Softcover reprint of the original 1st ed.... Digital Transmission - A Simulation-Aided Introduction with VisSim/Comm (Paperback, Softcover reprint of the original 1st ed. 2009)
Dayan Adionel Guimaraes
R6,748 Discovery Miles 67 480 Ships in 18 - 22 working days

Digital Transmission - A Simulation-Aided Introduction with VisSim/Comm is a book in which basic principles of digital communication, mainly pertaining to the physical layer, are emphasized. Nevertheless, these principles can serve as the fundamentals that will help the reader to understand more advanced topics and the associated technology. In this book, each topic is addressed in two different and complementary ways: theoretically and by simulation. The theoretical approach encompasses common subjects covering principles of digital transmission, like notions of probability and stochastic processes, signals and systems, baseband and passband signaling, signal-space representation, spread spectrum, multi-carrier and ultra wideband transmission, carrier and symbol-timing recovery, information theory and error-correcting codes. The simulation approach revisits the same subjects, focusing on the capabilities of the communication system simulation software VisSim/Comm on helping the reader to fulfill the gap between the theory and its practical meaning. The presentation of the theory is made easier with the help of 357 illustrations. A total of 101 simulation files supplied in the accompanying CD support the simulation-oriented approach. A full evaluation version and a viewer-only version of VisSim/Comm are also supplied in the CD.

Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Serge Fehr
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6,... Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings (Paperback, 1st ed. 2015)
Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, …
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.): Sagar Ajay Rahalkar Certified Ethical Hacker (CEH) Foundation Guide (Paperback, 1st ed.)
Sagar Ajay Rahalkar
R1,650 Discovery Miles 16 500 Ships in 18 - 22 working days

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. What You Will Learn Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker Who This Book Is For Beginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.): Janos A. Bergou, Mark Hillery Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.)
Janos A. Bergou, Mark Hillery
R2,246 Discovery Miles 22 460 Ships in 18 - 22 working days

Introduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics. Many standard subjects are treated, such as density matrices, entanglement, quantum maps, quantum cryptography, and quantum codes. Also included are discussions of quantum machines and quantum walks. In addition, the book provides detailed treatments of several underlying fundamental principles of quantum theory, such as quantum measurements, the no-cloning and no-signaling theorems, and their consequences. Problems of various levels of difficulty supplement the text, with the most challenging problems bringing the reader to the forefront of active research. This book provides a compact introduction to the fascinating and rapidly evolving interdisciplinary field of quantum information theory, and it prepares the reader for doing active research in this area.

Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19,... Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings (Paperback, 1st ed. 2016)
Benedikt Gierlichs, Axel Y. Poschmann
R3,116 Discovery Miles 31 160 Ships in 18 - 22 working days

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

A Life in Code - Pioneer Cryptanalyst Elizebeth Smith Friedman (Paperback): G. Stuart Smith A Life in Code - Pioneer Cryptanalyst Elizebeth Smith Friedman (Paperback)
G. Stuart Smith
R906 R672 Discovery Miles 6 720 Save R234 (26%) Ships in 10 - 15 working days

Protesters called it an act of war when the U.S. Coast Guard sank a Canadian-flagged vessel in the Gulf of Mexico in 1929. It took a cool-headed codebreaker solving a ""trunk-full"" of smugglers' encrypted messages to get Uncle Sam out of the mess: Elizebeth Smith Friedman's groundbreaking work helped prove the boat was owned by American gangsters. This book traces the career of a legendary U.S. law enforcement agent, from her work for the Allies during World War I through Prohibition, when she faced danger from mobsters while testifying in high profile trials. Friedman founded the cryptanalysis unit that provided evidence against American rum runners and Chinese drug smugglers. During World War II, her decryptions brought a Japanese spy to justice and her Coast Guard unit solved the Enigma ciphers of German spies. Friedman's ""all source intelligence"" model is still used by law enforcement and counterterrorism agencies against 21st century threats.

Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers... Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Thomas Peyrin
R3,976 Discovery Miles 39 760 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.

Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016): Byung-gyu Kim, Kalyan Goswami Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016)
Byung-gyu Kim, Kalyan Goswami
R1,603 Discovery Miles 16 030 Ships in 18 - 22 working days

This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.

Scalable Information Systems - 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised... Scalable Information Systems - 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Jason J. Jung, Costin Badica, Attila Kiss
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Scalable Information Systems, INFOSCALE 2014, held in September 2014 in Seoul, South Korea. The 9 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics such as scalable data analysis and big data applications.

Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I (Paperback, 2015 ed.)
Elisabeth Oswald, Marc Fischlin
R1,553 Discovery Miles 15 530 Ships in 18 - 22 working days

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (Paperback, 2015 ed.)
Elisabeth Oswald, Marc Fischlin
R2,804 Discovery Miles 28 040 Ships in 18 - 22 working days

The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.

Digital Watermarking Techniques in Curvelet and Ridgelet Domain (Paperback, 1st ed. 2016): Channapragada Rama Seshagiri Rao,... Digital Watermarking Techniques in Curvelet and Ridgelet Domain (Paperback, 1st ed. 2016)
Channapragada Rama Seshagiri Rao, Munaga V. N. K. Prasad
R1,656 Discovery Miles 16 560 Ships in 18 - 22 working days

This book describes the design, development, and testing of a novel digital watermarking technique for color images using Magic Square and Ridgelet transforms. The novel feature of the method is that it generates and uses multiple copies of the digital watermark. The book describes how the method was tested for embedding digital watermarks into color cover images, resulting in very high PSNR value and yielding comparable results with existing watermarking techniques.To reach this new method, eight different techniques are designed, developed and tested. First, the authors test two digital watermarking techniques based on encryption: Image Watermark Using Complete Complementary Code Technique (CCCT) and Image Watermarking Using CCC-Fast Walsh Hadamard Transform Technique (CCC-FWHTT). Next, four digital watermarking techniques based on curvelet transforms are discussed: Image Watermarking Using Curvelet Transform (WCT), Watermark Wavelets in Curvelets of Cover Image (WWCT), Resized Watermark into Curvelets of Cover Image (RWCT), and Resized Watermark Wavelets into Curvelets of Cover Image (RWWCT). Then, two final techniques are presented: Image Watermarking Based on Magic Square (MST) and Image watermarking based on Magic Square and Ridgelet Transform (MSRTT). Future research directions are explored in the final chapter.Designed for professionals and researchers in computer graphics and imaging, Digital Watermarking Techniques in Curvelet and Ridgelet Domain is also a useful tool for advanced-level students.

Classification Algorithms for Codes and Designs (Paperback, 2006 ed.): Petteri Kaski, Patric R.J. OEstergard Classification Algorithms for Codes and Designs (Paperback, 2006 ed.)
Petteri Kaski, Patric R.J. OEstergard
R3,142 Discovery Miles 31 420 Ships in 18 - 22 working days

A new starting-point and a new method are requisite, to insure a complete [classi?cation of the Steiner triple systems of order 15]. This method was furnished, and its tedious and di?cult execution und- taken, by Mr. Cole. F. N. Cole, L. D. Cummings, and H. S. White (1917) [129] The history of classifying combinatorial objects is as old as the history of the objects themselves. In the mid-19th century, Kirkman, Steiner, and others became the fathers of modern combinatorics, and their work - on various objects, including (what became later known as) Steiner triple systems - led to several classi?cation results. Almost a century earlier, in 1782, Euler [180] published some results on classifying small Latin squares, but for the ?rst few steps in this direction one should actually go at least as far back as ancient Greece and the proof that there are exactly ?ve Platonic solids. One of the most remarkable achievements in the early, pre-computer era is the classi?cation of the Steiner triple systems of order 15, quoted above. An onerous task that, today, no sensible person would attempt by hand calcu- tion. Because, with the exception of occasional parameters for which com- natorial arguments are e?ective (often to prove nonexistence or uniqueness), classi?cation in general is about algorithms and computation.

Probability, Random Processes, and Ergodic Properties (Paperback, 2nd ed. 2009): Robert M. Gray Probability, Random Processes, and Ergodic Properties (Paperback, 2nd ed. 2009)
Robert M. Gray
R4,255 Discovery Miles 42 550 Ships in 18 - 22 working days

Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists. Highlights: Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest. Structures mathematics for an engineering audience, with emphasis on engineering applications. New in the Second Edition: Much of the material has been rearranged and revised for pedagogical reasons. The original first chapter has been split in order to allow a more thorough treatment of basic probability before tackling random processes and dynamical systems. The final chapter has been broken into two pieces to provide separate emphasis on process metrics and the ergodic decomposition of affine functionals. Many classic inequalities are now incorporated into the text, along with proofs; and many citations have been added.

Information Processing and Security Systems (Paperback, 2005 ed.): Khalid Saeed, Jerzy Pejas Information Processing and Security Systems (Paperback, 2005 ed.)
Khalid Saeed, Jerzy Pejas
R5,195 Discovery Miles 51 950 Ships in 18 - 22 working days

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R2,936 Discovery Miles 29 360 Ships in 18 - 22 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES)... Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES) (Paperback, 2005 ed.)
Charles A. Shoniregun
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry.

Information Theory and Coding by Example (Hardcover, New): Mark Kelbert, Yuri Suhov Information Theory and Coding by Example (Hardcover, New)
Mark Kelbert, Yuri Suhov
R4,292 Discovery Miles 42 920 Ships in 10 - 15 working days

This fundamental monograph introduces both the probabilistic and algebraic aspects of information theory and coding. It has evolved from the authors' years of experience teaching at the undergraduate level, including several Cambridge Maths Tripos courses. The book provides relevant background material, a wide range of worked examples and clear solutions to problems from real exam papers. It is a valuable teaching aid for undergraduate and graduate students, or for researchers and engineers who want to grasp the basic principles.

Evolution of Semantic Systems (Paperback, 2013 ed.): Bernd-Olaf Kuppers, Udo Hahn, Stefan Artmann Evolution of Semantic Systems (Paperback, 2013 ed.)
Bernd-Olaf Kuppers, Udo Hahn, Stefan Artmann
R3,250 Discovery Miles 32 500 Ships in 18 - 22 working days

Complex systems in nature and society make use of information for the development of their internal organization and the control of their functional mechanisms. Alongside technical aspects of storing, transmitting and processing information, the various semantic aspects of information, such as meaning, sense, reference and function, play a decisive part in the analysis of such systems. With the aim of fostering a better understanding of semantic systems from an evolutionary and multidisciplinary perspective, this volume collects contributions by philosophers and natural scientists, linguists, information and computer scientists. They do not follow a single research paradigm; rather they shed, in a complementary way, new light upon some of the most important aspects of the evolution of semantic systems. Evolution of Semantic Systems is intended for researchers in philosophy, computer science, and the natural sciences who work on the analysis or development of semantic systems, ontologies, or similar complex information structures. In the eleven chapters, they will find a broad discussion of topics ranging from underlying universal principles to representation and processing aspects to paradigmatic examples.

Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004,... Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (Paperback, 2005 ed.)
Enrico Nardelli, Maurizio Talamo
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained. This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.

Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014,... Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings (Paperback, 2014 ed.)
Kai Uwe Schmidt, Arne Winterhof
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Sequences and Their Applications, SETA 2014, held in Melbourne, VIC, Australia, in November 2014. The 24 full papers presented together with 2 invited papers were carefully reviewed and selected from 36 submissions. The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays, relative difference sets, aperiodic correlation, pseudorandom sequences and stream ciphers, crosscorrelation of sequences, prime numbers in sequences, OFDM and CDMA, and frequency-hopping sequences.

ThinkQuest 2010 - Proceedings of the First International Conference on Contours of Computing Technology (Paperback, 2011 ed.):... ThinkQuest 2010 - Proceedings of the First International Conference on Contours of Computing Technology (Paperback, 2011 ed.)
S. J. Pise
R3,835 Discovery Miles 38 350 Ships in 18 - 22 working days

This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing, Fusion and Information Technology areas, Digital radio Communication, Wimax, Electrical engg, VLSI approach to processor design, embedded systems design are dealt in detail through models and illustrative techniques.

Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St.... Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings (Paperback, 2010 ed.)
Luis M. Camarinha-Matos, Xavier Boucher, Hamideh Afsarmanesh
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor. In recent years there has been a growing awareness both in the political sphere and in civil society including the bu- ness sectors, on the importance of sustainability. Therefore, this is an important and timely research issue, not only in terms of systems design but also as an effort to b- row and integrate contributions from different disciplines when designing and/or g- erning those systems. The discipline of collaborative networks especially, which has already emerged in many application sectors, shall play a key role in the implemen- tion of effective sustainability strategies. PRO-VE 2010 focused on sharing knowledge and experiences as well as identi- ing directions for further research and development in this area. The conference - dressed models, infrastructures, support tools, and governance principles developed for collaborative networks, as important resources to support multi-stakeholder s- tainable developments. Furthermore, the challenges of this theme open new research directions for CNs. PRO-VE 2010 held in St.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Python for Data Analysis - Learn the…
Robert Campbell Hardcover R758 R667 Discovery Miles 6 670
Multi-point Interaction with Real and…
Federico Barbagli, Domenico Prattichizzo, … Hardcover R2,810 Discovery Miles 28 100
Playful Disruption of Digital Media
Daniel Cermak-Sassenrath Hardcover R2,691 Discovery Miles 26 910
Handbook of Research on Human-Computer…
Katherine Blashki, Pedro Isaias Hardcover R6,849 Discovery Miles 68 490
Knowledge Representations for Planning…
Franziska Zacharias Hardcover R2,645 Discovery Miles 26 450
Intro to Python for Computer Science and…
Paul Deitel Paperback R1,815 R1,474 Discovery Miles 14 740
IoT Applications Computing
Ishwar Singh, Zhen Gao, … Hardcover R3,096 Discovery Miles 30 960
Web Engineering
Carson Thomas Hardcover R3,292 R2,982 Discovery Miles 29 820
Artificial Psychology - Psychological…
James A. Crowder, John Carbone, … Hardcover R3,661 Discovery Miles 36 610
Coding for Kids Ages 9-15 - Simple HTML…
Bob Mather Hardcover R843 Discovery Miles 8 430

 

Partners