0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (6)
  • R250 - R500 (59)
  • R500+ (5,338)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Applications of Logic Databases (Paperback, Softcover reprint of the original 1st ed. 1995): Raghu Ramakrishnan Applications of Logic Databases (Paperback, Softcover reprint of the original 1st ed. 1995)
Raghu Ramakrishnan
R4,015 Discovery Miles 40 150 Ships in 18 - 22 working days

The development of a methodology for using logic databases is essential if new users are to be able to use these systems effectively to solve their problems, and this remains a largely unrealized goal. A workshop was organized in conjunction with the ILPS '93 Conference in Vancouver in October 1993 to provide a forum for users and implementors of deductive systems to share their experience. The emphasis was on the use of deductive systems. In addition to paper presentations, a number of systems were demonstrated. The papers of this book were drawn largely from the papers presented at the workshop, which have been extended and revised for inclusion here, and also include some papers describing interesting applications that were not discussed at the workshop. The applications described here should be seen as a starting point: a number of promising application domains are identified, and several interesting application packages are described, which provide the inspiration for further development.Declarative rule-based database systems hold a lot of promise in a wide range of application domains, and we need a continued stream of application development to better understand this potential and how to use it effectively. This book contains the broadest collection to date of papers describing implemented, significant applications of logic databases, and database systems as well as potential database users in such areas as scientific data management and complex decision support.

Evolutionary Multi-Criterion Optimization - 7th International Conference, EMO 2013, Sheffield, UK, March 19-22, 2013.... Evolutionary Multi-Criterion Optimization - 7th International Conference, EMO 2013, Sheffield, UK, March 19-22, 2013. Proceedings (Paperback, 2013 ed.)
Robin Purshouse, Peter Fleming, Carlos M. Fonseca, Salvatore Greco, Jane Shaw
R1,560 Discovery Miles 15 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Evolutionary Multi-Criterion Optimization, EMO 2013 held in Sheffield, UK, in March 2013. The 57 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are grouped in topical sections on plenary talks; new horizons; indicator-based methods; aspects of algorithm design; pareto-based methods; hybrid MCDA; decomposition-based methods; classical MCDA; exploratory problem analysis; product and process applications; aerospace and automotive applications; further real-world applications; and under-explored challenges.

Computer Vision, Imaging and Computer Graphics - Theory and Applications - International Joint Conference, VISIGRAPP 2011,... Computer Vision, Imaging and Computer Graphics - Theory and Applications - International Joint Conference, VISIGRAPP 2011, Vilamoura, Portugal, March 5-7, 2011. Revised Selected Papers (Paperback, 2013 ed.)
Gabriela Csurka, Martin Kraus, Leonid Mestetskiy, Paul Richard, Jose Braz
R1,406 Discovery Miles 14 060 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference, VISIGRAPP 2011, the Joint Conference on Computer Vision, Theory and Applications (VISAPP), on Imaging Theory and Applications (IMAGAPP), on Computer Graphics Theory and Applications (GRAPP), and on Information Visualization Theory and Applications (IVAPP), held in Vilamoura, Portugal, in March 2011. The 15 revised full papers presented together with one invited paper were carefully reviewed and selected. The papers are organized in topical sections on computer graphics theory and applications; imaging theory and applications; information visualization theory and applications; and computer vision theory and applications.

Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May... Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece (Paperback, Softcover reprint of the original 1st ed. 2003)
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Parallel Processing and Applied Mathematics - 10th International Conference, PPAM 2013, Warsaw, Poland, September 8-11, 2013,... Parallel Processing and Applied Mathematics - 10th International Conference, PPAM 2013, Warsaw, Poland, September 8-11, 2013, Revised Selected Papers, Part I (Paperback, 2014 ed.)
Roman Wyrzykowski, Jack Dongarra, Konrad Karczewski, Jerzy Wa sniewski
R1,554 Discovery Miles 15 540 Ships in 18 - 22 working days

This two-volume-set (LNCS 8384 and 8385) constitutes the refereed proceedings of the 10th International Conference of Parallel Processing and Applied Mathematics, PPAM 2013, held in Warsaw, Poland, in September 2013. The 143 revised full papers presented in both volumes were carefully reviewed and selected from numerous submissions. The papers cover important fields of parallel/distributed/cloud computing and applied mathematics, such as numerical algorithms and parallel scientific computing; parallel non-numerical algorithms; tools and environments for parallel/distributed/cloud computing; applications of parallel computing; applied mathematics, evolutionary computing and metaheuristics.

Combinatorial Pattern Matching - 25th Annual Symposium, CPM 2014, Moscow, Russia, June 16-18, 2014. Proceedings (Paperback,... Combinatorial Pattern Matching - 25th Annual Symposium, CPM 2014, Moscow, Russia, June 16-18, 2014. Proceedings (Paperback, 2014 ed.)
Alexander S. Kulikov, Sergei O. Kuznetsov, Pavel Pevzner
R2,174 Discovery Miles 21 740 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 25th Annual Symposium on Combinatorial Pattern Matching, CPM 2014, held in Moscow, Russia, in June 2014. The 28 revised full papers presented together with 5 invited talks were carefully reviewed and selected from 54 submissions. The papers address issues of searching and matching strings and more complicated patterns such as trees; regular expressions; graphs; point sets; and arrays. The goal is to derive combinatorial properties of such structures and to exploit these properties in order to achieve superior performance for the corresponding computational problems. The meeting also deals with problems in computational biology; data compression and data mining; coding; information retrieval; natural language processing; and pattern recognition.

Wireless Algorithms, Systems, and Applications - 9th International Conference, WASA 2014, Harbin, China, June 23-25, 2014,... Wireless Algorithms, Systems, and Applications - 9th International Conference, WASA 2014, Harbin, China, June 23-25, 2014, Proceedings (Paperback, 2014 ed.)
Zhipeng Cai, Chaokun Wang, Siyao Cheng, Hongzhi Wang, Hong Gao
R2,795 Discovery Miles 27 950 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. The 41 revised full papers presented together with 30 invited papers were carefully reviewed and selected from 134 submissions. The papers cover a wide range of topics including cognitive radio networks, wireless sensor networks, cyber-physical systems, distributed and localized algorithm design and analysis, information and coding theory for wireless networks, localization, mobile cloud computing, topology control and coverage, security and privacy, underwater and underground networks, vehicular networks, information processing and data management, programmable service interfaces, energy-efficient algorithms, system and protocol design, operating system and middle-ware support and experimental test-beds and models.

Advances in Computing, Communication, and Control - Third International Conference, ICAC3 2013, Mumbai, India, January 18-19,... Advances in Computing, Communication, and Control - Third International Conference, ICAC3 2013, Mumbai, India, January 18-19, 2013, Proceedings (Paperback, 2013 ed.)
Srija Unnikrishnan, Sunil Surve, Deepak Bhoir
R2,780 Discovery Miles 27 800 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Advances in Computing, Communication and Control, ICAC3 2013, held in Mumbai, India, in January 2013. The 69 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They deal with topics such as image processing, artificial intelligence, robotics, wireless communications; data warehousing and mining, and are organized in topical sections named: computing; communication; control; and others.

Algorithms for Sensor Systems - 8th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and... Algorithms for Sensor Systems - 8th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2012, Ljubljana, Slovenia, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Amotz Bar-Noy, Magnus M. Halldorsson
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2012, held in Ljubljana, Slovenia, in September 2012. The 11 revised full papers presented together with two invited keynote talks and two brief announcements were carefully reviewed and selected from 24 submissions. The papers are organized in two tracks: sensor networks - covering topics such as barrier resilience, localization, connectivity with directional antennas, broadcast scheduling, and data aggregation; and ad hoc wireless and mobile systems - covering topics such as: SINR model; geometric routing; cognitive radio networks; video delivery; and mapping polygons.

Mathematical and Engineering Methods in Computer Science - 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech... Mathematical and Engineering Methods in Computer Science - 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Antonin Kucera, Thomas A. Henzinger, Jaroslav Nesetril, Tomas Vojnar, David Antos
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume contains the post-proceedings of the 8th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2012, held in Znojmo, Czech Republic, in October, 2012. The 13 thoroughly revised papers were carefully selected out of 31 submissions and are presented together with 6 invited papers. The topics covered by the papers include: computer-aided analysis and verification, applications of game theory in computer science, networks and security, modern trends of graph theory in computer science, electronic systems design and testing, and quantum information processing.

Applied Parallel and Scientific Computing - 11th International Conference, PARA 2012, Helsinki, Finland (Paperback, 2013 ed.):... Applied Parallel and Scientific Computing - 11th International Conference, PARA 2012, Helsinki, Finland (Paperback, 2013 ed.)
Pekka Manninen, Per OEster
R1,486 Discovery Miles 14 860 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 11th International Conference on Applied Parallel and Scientific Computing, PARA 2012, held in Helsinki, Finland, in June 2012. The 35 revised full papers presented were selected from numerous submissions and are organized in five technical sessions covering the topics of advances in HPC applications, parallel algorithms, performance analyses and optimization, application of parallel computing in industry and engineering, and HPC interval methods. In addition, three of the topical minisymposia are described by a corresponding overview article on the minisymposia topic. In order to cover the state-of-the-art of the field, at the end of the book a set of abstracts describe some of the conference talks not elaborated into full articles.

Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings (Paperback, 2014 ed.)
Phong Q. Nguyen, Elisabeth Oswald
R1,524 Discovery Miles 15 240 Ships in 18 - 22 working days

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.

Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, TACAS 2014, Held as Part of... Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, TACAS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Erika Abraham, Klaus Havelund
R1,509 Discovery Miles 15 090 Ships in 18 - 22 working days

This book constitutes the proceedings of the 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2014, which took place in Grenoble, France, in April 2014, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014. The total of 42 papers included in this volume, consisting of 26 research papers, 3 case study papers, 6 regular tool papers and 7 tool demonstrations papers, were carefully reviewed and selected from 161 submissions. In addition the book contains one invited contribution. The papers are organized in topical sections named: decision procedures and their application in analysis; complexity and termination analysis; modeling and model checking discrete systems; timed and hybrid systems; monitoring, fault detection and identification; competition on software verification; specifying and checking linear time properties; synthesis and learning; quantum and probabilistic systems; as well as tool demonstrations and case studies.

Big Data Analytics - Second International Conference, BDA 2013, Mysore, India, December 16-18, 2013, Proceedings (Paperback,... Big Data Analytics - Second International Conference, BDA 2013, Mysore, India, December 16-18, 2013, Proceedings (Paperback, 2013 ed.)
Vasudha Bhatnagar, Srinath Srinivasa
R1,920 Discovery Miles 19 200 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the Second International Conference on Big Data Analytics, BDA 2013, held in Mysore, India, in December 2013. The 13 revised full papers were carefully reviewed and selected from 49 submissions and cover topics on mining social media data, perspectives on big data analysis, graph analysis, big data in practice.

Computer Engineering and Technology - 16th National Conference, NCCET 2012, Shanghai, China, August 17-19, 2012, Revised... Computer Engineering and Technology - 16th National Conference, NCCET 2012, Shanghai, China, August 17-19, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Weixia Xu, Liquan Xiao, Pingjing Lu, Jinwen Li, Chengyi Zhang
R1,404 Discovery Miles 14 040 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th National Conference on Computer Engineering and Technology, NCCET 2012, held in Shanghai, China, in August 2012. The 27 papers presented were carefully reviewed and selected from 108 submissions. They are organized in topical sections named: microprocessor and implementation; design of integration circuit; I/O interconnect; and measurement, verification, and others.

Selected Areas in Cryptography - 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected... Selected Areas in Cryptography - 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Lars R. Knudsen, Huapeng Wu
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.

Bioinspired Computation in Combinatorial Optimization - Algorithms and Their Computational Complexity (Paperback, 2010 ed.):... Bioinspired Computation in Combinatorial Optimization - Algorithms and Their Computational Complexity (Paperback, 2010 ed.)
Frank Neumann, Carsten Witt
R1,390 Discovery Miles 13 900 Ships in 18 - 22 working days

Bioinspired computation methods such as evolutionary algorithms and ant colony optimization are being applied successfully to complex engineering problems and to problems from combinatorial optimization, and with this comes the requirement to more fully understand the computational complexity of these search heuristics. This is the first textbook covering the most important results achieved in this area.

The authors study the computational complexity of bioinspired computation and show how runtime behavior can be analyzed in a rigorous way using some of the best-known combinatorial optimization problems -- minimum spanning trees, shortest paths, maximum matching, covering and scheduling problems. A feature of the book is the separate treatment of single- and multiobjective problems, the latter a domain where the development of the underlying theory seems to be lagging practical successes.

This book will be very valuable for teaching courses on bioinspired computation and combinatorial optimization. Researchers will also benefit as the presentation of the theory covers the most important developments in the field over the last 10 years. Finally, with a focus on well-studied combinatorial optimization problems rather than toy problems, the book will also be very valuable for practitioners in this field.

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Sparsity - Graphs, Structures, and Algorithms (Paperback, 2012 ed.): Jaroslav Nesetril, Patrice Ossona de Mendez Sparsity - Graphs, Structures, and Algorithms (Paperback, 2012 ed.)
Jaroslav Nesetril, Patrice Ossona de Mendez
R2,477 Discovery Miles 24 770 Ships in 18 - 22 working days

This is the first book devoted to the systematic study of sparse graphs and sparse finite structures. Although the notion of sparsity appears in various contexts and is a typical example of a hard to define notion, the authors devised an unifying classification of general classes of structures. This approach is very robust and it has many remarkable properties. For example the classification is expressible in many different ways involving most extremal combinatorial invariants. This study of sparse structures found applications in such diverse areas as algorithmic graph theory, complexity of algorithms, property testing, descriptive complexity and mathematical logic (homomorphism preservation,fixed parameter tractability and constraint satisfaction problems). It should be stressed that despite of its generality this approach leads to linear (and nearly linear) algorithms. Jaroslav Nesetril is a professor at Charles University, Prague; Patrice Ossona de Mendez is a CNRS researcher et EHESS, Paris. This book is related to the material presented by the first author at ICM 2010.

Parallel Architectures and Bioinspired Algorithms (Paperback, 2012 ed.): Francisco Fernandez De Vega, Jose Ignacio Hidalgo... Parallel Architectures and Bioinspired Algorithms (Paperback, 2012 ed.)
Francisco Fernandez De Vega, Jose Ignacio Hidalgo Perez, Juan Lanchares
R4,012 Discovery Miles 40 120 Ships in 18 - 22 working days

This monograph presents examples of best practices when combining bioinspired algorithms with parallel architectures. The book includes recent work by leading researchers in the field and offers a map with the main paths already explored and new ways towards the future. Parallel Architectures and Bioinspired Algorithms will be of value to both specialists in Bioinspired Algorithms, Parallel and Distributed Computing, as well as computer science students trying to understand the present and the future of Parallel Architectures and Bioinspired Algorithms.

Video and Image Processing in Multimedia Systems (Paperback, Softcover reprint of the original 1st ed. 1995): Borko Furht,... Video and Image Processing in Multimedia Systems (Paperback, Softcover reprint of the original 1st ed. 1995)
Borko Furht, Stephen W. Smoliar, HongJiang Zhang
R5,170 Discovery Miles 51 700 Ships in 18 - 22 working days

Video and Image Processing in Multimedia Systems treats a number of critical topics in multimedia systems, with respect to image and video processing techniques and their implementations. These techniques include: * Image and video compression techniques and standards, and * Image and video indexing and retrieval techniques. Video and Image Processing in Multimedia Systems is divided into three parts. Part I serves as an introduction to multimedia systems, discussing basic concepts, multimedia networking and synchronization, and an overview of multimedia applications. Part II presents comprehensive coverage of image and video compression techniques and standards, their implementations and applications. Because multimedia data (specifically video and images) require efficient compression techniques in order to be stored and delivered in real-time, video and image compression is a crucial element of an effective multimedia system. In Part III attention is focused on the semantic nature of image and video source material, and how that material may be effectively indexed and retrieved.Topics discussed include static images, full-motion video, and the manner in which compressed representations can facilitate structural analysis. Part III concludes with an extended discussion of a case study. This book serves as an invaluable reference with respect to the most important standards in the field. Video and Image Processing in Multimedia Systems is suitable as a textbook for course use.

Evolution as Computation - DIMACS Workshop, Princeton, January 1999 (Paperback, Softcover reprint of the original 1st ed.... Evolution as Computation - DIMACS Workshop, Princeton, January 1999 (Paperback, Softcover reprint of the original 1st ed. 2002)
Laura F. Landweber, Erik Winfree
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

The study of the genetic basis for evolution has flourished in this century, as well as our understanding of the evolvability and programmability of biological systems. Genetic algorithms meanwhile grew out of the realization that a computer program could use the biologically-inspired processes of mutation, recombination, and selection to solve hard optimization problems. Genetic and evolutionary programming provide further approaches to a wide variety of computational problems. A synthesis of these experiences reveals fundamental insights into both the computational nature of biological evolution and processes of importance to computer science. Topics include biological models of nucleic acid information processing and genome evolution; molecules, cells, and metabolic circuits that compute logical relationships; the origin and evolution of the genetic code; and the interface with genetic algorithms and genetic and evolutionary programming.

Efficient Algorithms for Discrete Wavelet Transform - With Applications to Denoising and Fuzzy Inference Systems (Paperback,... Efficient Algorithms for Discrete Wavelet Transform - With Applications to Denoising and Fuzzy Inference Systems (Paperback, 2013 ed.)
K.K. Shukla, Arvind K. Tiwari
R1,635 Discovery Miles 16 350 Ships in 18 - 22 working days

Due to its inherent time-scale locality characteristics, the discrete wavelet transform (DWT) has received considerable attention in signal/image processing. Wavelet transforms have excellent energy compaction characteristics and can provide perfect reconstruction. The shifting (translation) and scaling (dilation) are unique to wavelets. Orthogonality of wavelets with respect to dilations leads to multigrid representation. As the computation of DWT involves filtering, an efficient filtering process is essential in DWT hardware implementation. In the multistage DWT, coefficients are calculated recursively, and in addition to the wavelet decomposition stage, extra space is required to store the intermediate coefficients. Hence, the overall performance depends significantly on the precision of the intermediate DWT coefficients. This work presents new implementation techniques of DWT, that are efficient in terms of computation, storage, and with better signal-to-noise ratio in the reconstructed signal.

Public-Key Cryptography -- PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos... Public-Key Cryptography -- PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings (Paperback, 2014 ed.)
Hugo Krawczyk
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.

Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014.... Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Jan Jurjens, Frank Piessens, Nataliia Bielova
R2,026 Discovery Miles 20 260 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Reachable Sets of Dynamic Systems…
Stanislaw Raczynski Paperback R3,927 Discovery Miles 39 270
Dual-Pivot Quicksort and Beyond…
Sebastian Wild Hardcover R1,237 Discovery Miles 12 370
Introduction to Chemical Engineering…
Henry C. Foley Paperback R3,120 Discovery Miles 31 200
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,055 Discovery Miles 30 550
Python Programming for Computations…
Computer Language Hardcover R1,120 R949 Discovery Miles 9 490
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,553 Discovery Miles 25 530
GPU-based Parallel Implementation of…
Ying Tan Paperback R2,065 Discovery Miles 20 650
Gamma Solution - An Application of…
James R Warren Hardcover R1,232 R1,048 Discovery Miles 10 480
Computational and Statistical Methods…
Shen Liu, James McGree, … Hardcover R1,802 Discovery Miles 18 020
C Programming - C Programming Language…
Adam Dodson Hardcover R551 R505 Discovery Miles 5 050

 

Partners