• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Automata, Languages and Programming: 35th International Colloquium, Icalp 2008 Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Automata, Languages and Programming: 35th International Colloquium, Icalp 2008 Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II

ISBN-13: 9783540705826 / Angielski / Miękka / 2008 / 760 str.

Luca Aceto
Automata, Languages and Programming: 35th International Colloquium, Icalp 2008 Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II Aceto, Luca 9783540705826 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Automata, Languages and Programming: 35th International Colloquium, Icalp 2008 Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II

ISBN-13: 9783540705826 / Angielski / Miękka / 2008 / 760 str.

Luca Aceto
cena 403,47 zł
(netto: 384,26 VAT:  5%)

Najniższa cena z 30 dni: 385,52 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

ICALP 2008, the 35th edition of the International Colloquium on Automata, Languages and Programming, was held in Reykjavik, Iceland, July 7-11, 2008. ICALP is a series of annual conferences of the European Association for Th- reticalComputer Science(EATCS) which ?rsttook placein 1972.This year, the ICALP program consisted of the established Track A (focusing on algorithms, automata, complexityandgames)andTrackB(focusing onlogic, semanticsand theory of programming), and of the recently introduced Track C (focusing on security and cryptography foundations). In response to the call for papers, the Program Committees received 477 submissions, the highest ever: 269 for Track A, 122 for TrackB and 86 for Track C. Out of these, 126 papers were selected for inclusion in the scienti?c program: 70 papers for Track A, 32 for Track B and 24 for Track C. The selection was made by the Program Committees based on originality, quality, and relevance to theoretical computer science. The quality of the manuscripts was very high indeed, and many deserving papers could not be selected. ICALP 2008 consisted of ?ve invited lectures and the contributed papers.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Computer Science
Computers > Software Development & Engineering - General
Mathematics > Matematyka dyskretna
Wydawca:
Springer
Seria wydawnicza:
Lecture Notes in Computer Science
Język:
Angielski
ISBN-13:
9783540705826
Rok wydania:
2008
Wydanie:
2008
Numer serii:
000013115
Ilość stron:
760
Waga:
1.01 kg
Wymiary:
23.62 x 15.49 x 2.54
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

Invited Lectures.- Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency.- Newton’s Method for ?-Continuous Semirings.- Track B: Logic, Semantics, and Theory of Programming.- The Tractability Frontier for NFA Minimization.- Finite Automata, Digraph Connectivity, and Regular Expression Size.- Leftist Grammars Are Non-primitive Recursive.- On the Computational Completeness of Equations over Sets of Natural Numbers.- Placement Inference for a Client-Server Calculus.- Extended pi-Calculi.- Completeness and Logical Full Abstraction in Modal Logics for Typed Mobile Processes.- On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases.- On Expressiveness and Complexity in Real-Time Model Checking.- STORMED Hybrid Systems.- Controller Synthesis and Verification for Markov Decision Processes with Qualitative Branching Time Objectives.- On Datalog vs. LFP.- Directed st-Connectivity Is Not Expressible in Symmetric Datalog.- Non-dichotomies in Constraint Satisfaction Complexity.- Quantified Constraint Satisfaction and the Polynomially Generated Powers Property.- When Does Partial Commutative Closure Preserve Regularity?.- Weighted Logics for Nested Words and Algebraic Formal Power Series.- Tree Languages Defined in First-Order Logic with One Quantifier Alternation.- Duality and Equational Theory of Regular Languages.- Reversible Flowchart Languages and the Structured Reversible Program Theorem.- Attribute Grammars and Categorical Semantics.- A Domain Theoretic Model of Qubit Channels.- Interacting Quantum Observables.- Perpetuality for Full and Safe Composition (in a Constructive Setting).- A System F with Call-by-Name Exceptions.- Linear Logical Algorithms.- A Simple Model of Separation Logic for Higher-Order Store.- Open Implication.- ATL* Satisfiability Is 2EXPTIME-Complete.- Visibly Pushdown Transducers.- The Non-deterministic Mostowski Hierarchy and Distance-Parity Automata.- Analyzing Context-Free Grammars Using an Incremental SAT Solver.- Track C: Security and Cryptography Foundations.- Weak Pseudorandom Functions in Minicrypt.- On Black-Box Ring Extraction and Integer Factorization.- Extractable Perfectly One-Way Functions.- Error-Tolerant Combiners for Oblivious Primitives.- Asynchronous Multi-Party Computation with Quadratic Communication.- Improved Garbled Circuit: Free XOR Gates and Applications.- Improving the Round Complexity of VSS in Point-to-Point Networks.- How to Protect Yourself without Perfect Shredding.- Universally Composable Undeniable Signature.- Interactive PCP.- Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model.- Delegating Capabilities in Predicate Encryption Systems.- Bounded Ciphertext Policy Attribute Based Encryption.- Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks.- Composable Security in the Bounded-Quantum-Storage Model.- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak.- History-Independent Cuckoo Hashing.- Building a Collision-Resistant Compression Function from Non-compressing Primitives.- Robust Multi-property Combiners for Hash Functions Revisited.- Homomorphic Encryption with CCA Security.- How to Encrypt with the LPN Problem.- Could SFLASH be Repaired?.- Password Mistyping in Two-Factor-Authenticated Key Exchange.- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials.

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008.

The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5126 contains 56 contributions of track B and track C selected from 208 submissions and 2 invited lectures. The papers for track B are organized in topical sections on bounds, distributed computation, real-time and probabilistic systems, logic and complexity, words and trees, nonstandard models of computation, reasoning about computation, and verification. The papers of track C cover topics in security and cryptography such as theory, secure computation, two-party protocols and zero-knowledge, encryption with special properties/quantum cryptography, various types of hashing, as well as public-key cryptography and authentication.

Aceto, Luca Luca Aceto is Professor of Computer Science at Rey... więcej >


Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia