ECDL 2002 was the 6th conference in the series of European Conferences on Research and Advanced Technologies for Digital Libraries. Following previous events in Pisa (1997), Heraklion (1998), Paris (1999), Lisbon (2000), and Da- stadt (2001), this year ECDL was held in Rome. ECDL 2002 contributed, - gether with the previous conferences, to establishing ECDL as the major - ropean forum focusing on digital libraries and associated technical, practical, and social issues. ECDL 2002 continued the tradition already established by the previous conferences in meeting the needs of a large and diverse...
ECDL 2002 was the 6th conference in the series of European Conferences on Research and Advanced Technologies for Digital Libraries. Following previous...
This book presents the tutorial lectures given by leading experts in the area at the IFIP WG 7.3 International Symposium on Computer Modeling, Measurement and Evaluation, Performance 2002, held in Rome, Italy in September 2002.The survey papers presented are devoted to theoretical and methodological advances in performance and reliability evaluation as well as new perspectives in the major application fields. Modeling and verification issues, solution methods, workload characterization, and benchmarking are addressed from the methodological point of view. Among the applications dealt with are...
This book presents the tutorial lectures given by leading experts in the area at the IFIP WG 7.3 International Symposium on Computer Modeling, Measure...
Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures - both government and commercial - such as the effective prevention of, detection of, reporting of, response to and recovery from security incidents. The conference, sponsored by the Datacard Group and Hewlett-Packard Laboratories, was held on October 1-3, 2002. Organizational support was provided by the Center for Cryptography, Computer and Network Security Center at the University of Wisconsin- Milwaukee. Organizing a...
Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the sec...
Among the chemical and physical processes involved in the transformation of pollutants between their sources and their ultimate deposition, those associated with clouds, aerosols and precipitation must be rated as the most difficult both to study and to understand. This book presents a variety of recent advances in this field, including the properties and composition of aerosol particles, chemical transformation and scavenging processes, the relationship between liquid-phase chemistry and cloud micro-physics, entrainment, evaporation and deposition, trends in high Alpine pollution, transport...
Among the chemical and physical processes involved in the transformation of pollutants between their sources and their ultimate deposition, those asso...
Ada 95 is the advanced version of the Ada programming language. The book is divided into four parts: the introduction is a general discussion of the scope and objectives of the Ada 95 and its major technical features; the second part contains a more detailed step-by-step account of the core language; part three consists of several annexes addressing the predefined environment and specialized application areas; finally the three appendices are devoted to the upward compatibility with Ada 83 and a summary of requirements. The text aims to provide a systematic guide to the new features of the...
Ada 95 is the advanced version of the Ada programming language. The book is divided into four parts: the introduction is a general discussion of the s...
This book studies the large-time asymptotic behavior of solutions of the pure initial value problem for linear dispersive equations with constant coefficients and homogeneous symbols in one space dimension. Complete matched and uniformly-valid asymptotic expansions are obtained and sharp error estimates are proved. Using the method of steepest descent much new information on the regularity and spatial asymptotics of the solutions are also obtained. Applications to nonlinear dispersive equations are discussed. This monograph is intended for researchers and graduate students of partial...
This book studies the large-time asymptotic behavior of solutions of the pure initial value problem for linear dispersive equations with constant coef...
The volume presents 22 revised full papers carefully selected for inclusion together with an invited survey on the state-of-the-art in scatter search by Fred Glover. The papers are organized in topical sections on genetic-algorithm operators, applications in various areas, theoretical issues, methodologies, and evolvable hardware and robotics.
The volume presents 22 revised full papers carefully selected for inclusion together with an invited survey on the state-of-the-art in scatter search ...
Given the broad popularity of Internet technology, even in its present immature state, and also the recent progress made towards a human-centered view of information technology, the time now seems ripe to essentially extend the scope and power of enterprise information systems. This carefully arranged book concentrates on the relationships between coordination technology and business application requirements and introduces general elements of a cooperative infrastructure allowing for the construction of collaborative applications. It is essential reading for research and development...
Given the broad popularity of Internet technology, even in its present immature state, and also the recent progress made towards a human-centered view...
During the last few years, we have seen quite spectacular progress in the area of approximation algorithms: for several fundamental optimization problems we now actually know matching upper and lower bounds for their approximability. This textbook-like tutorial is a coherent and essentially self-contained presentation of the enormous recent progress facilitated by the interplay between the theory of probabilistically checkable proofs and aproximation algorithms. The basic concepts, methods, and results are presented in a unified way to provide a smooth introduction for newcomers. These...
During the last few years, we have seen quite spectacular progress in the area of approximation algorithms: for several fundamental optimization probl...
These are the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '99, held in Prague, Czech Republic in May 1999. The 32 revised full papers presented were selected during a competitive reviewing process. The book is divided in topical sections on cryptanalysis, hash functions, foundations, public key cryptosystems, watermarking and fingerprinting, elliptic curves, new schemes, block ciphers, distributed cryptography, tools from related areas, and broadcast and multicast.
These are the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '99, held in P...