![]() |
Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings
ISBN: 9783642314094 / Angielski / Miękka / 424 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012.
Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACR...
|
cena:
201,72 |
![]() |
Progress in VLSI Design and Test: 16th International Symposium on Vsli Design and Test, Vdat 2012, Shipur, India, July 1-4, 2012, Proceedings
ISBN: 9783642314933 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July 2012. The 30 revised regular papers presented together with 10 short papers and 13 poster sessions were carefully selected from 135 submissions. The papers are organized in topical sections on VLSI design, design and modeling of digital circuits and systems, testing and verification, design for testability, testing memories and regular logic arrays, embedded systems: hardware/software co-design and verification, emerging technology: nanoscale...
This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July...
|
cena:
201,72 |
![]() |
Information Technology Convergence, Secure and Trust Computing, and Data Management: Itcs 2012 & Sta 2012
ISBN: 9789400750821 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services. The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and... The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, ...
|
cena:
605,23 |
![]() |
Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings
ISBN: 9783642322839 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels;...
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in ...
|
cena:
185,62 |
![]() |
Information Flow Based Security Control Beyond Rbac: How to Enable Fine-Grained Security Policy Enforcement in Business Processes Beyond Limitations o
ISBN: 9783834826176 / Angielski / Miękka / 161 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as granting access to information provided that it will not be disclosed to targets outside our organisation during further...
Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in ...
|
cena:
201,72 |
![]() |
Open Problems in Communication and Computation
ISBN: 9781461291626 / Angielski / Miękka / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation conducted in the summers of 1984 and 1985 in Morristown, New Jersey, and the summer of 1986 in Palo Alto. California. The structure of this workshop was unique: no recent results. no surveys. Instead. we asked for outstanding open prob lems in the field. There are many famous open problems, including the question P = NP?, the simplex conjecture in communication theory, the capacity region of the broadcast channel. and the two.helper problem in...
Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation con...
|
cena:
403,47 |
![]() |
Spectrum Estimation and System Identification
ISBN: 9781461383208 / Angielski / Miękka / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to ways of characterizing the mechanism or system behind the observed sig nal/data. Such an identification allows one to predict the system outputs, and as a result this has considerable impact in several areas such as speech processing, pattern recognition, target identification, seismology, and signal processing. A new outlook to spectrum estimation and system identification is pre sented here by making use of the powerful concepts of positive...
Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to w...
|
cena:
403,47 |
![]() |
Relative Information: Theories and Applications
ISBN: 9783642840197 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usually referred to as Shannon entropy. Since the publication of Shannon's seminal paper in 1948, the theory has grown extremely rapidly and has been applied with varied success in almost all areas of human endeavor. At this time, the Shannon information theory is a well established and developed body of knowledge. Among its most significant recent contributions have been the use of the complementary principles of minimum and maximum entropy in...
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usu...
|
cena:
201,72 |
![]() |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
ISBN: 9781461454151 / Angielski / Twarda / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling... Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ... |
cena:
403,47 |
![]() |
Formal Languages and Computation: Models and Their Applications
ISBN: 9781466513457 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applications in computer science. It covers all rudimental topics concerning formal languages and their models, especially grammars and automata, and sketches the basic ideas underlying the theory of computation, including computability, decidability, and computational complexity. Emphasizing the relationship between theory and application, the book describes many real-world applications, including computer science engineering techniques for language... Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applica... |
cena:
460,50 |
![]() |
Multimedia Information Storage and Management
ISBN: 9781461286226 / Angielski / Miękka / 484 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interface. The large size of multimedia data and the high bandwidth requirement of multime- dia streams require new storage, buffering, delivery, and networking schemes. The presentational nature of multimedia applications requires a proper syn- chronization between multimedia streams, and the composition of multimedia documents in the distributed environment should overcome the heterogeneity of underlying systems. This book is edited for...
Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interf...
|
cena:
806,99 |
![]() |
The Maximum Entropy Method
ISBN: 9783642644849 / Angielski / Miękka / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal publication, this principle has been adopted in many areas of science and technology beyond its initial application. It is now found in spectral analysis, image restoration and a number of branches ofmathematics and physics, and has become better known as the Maximum Entropy Method (MEM). Today MEM is a powerful means to deal with ill-posed problems, and much research work is devoted to it. My own research in the area ofMEM started in 1980,...
Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal...
|
cena:
403,47 |
![]() |
Are there fundamental principles in Geographic Information Science?: Tobler Lecture Event 2012 of the Association of American Geographers Geographic I
ISBN: 9781478213628 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in Geographic Information Science (GIScience). Michael Goodchild offers an afterword and Waldo Tobler contributes a preface. The book is intended for advanced undergraduate and graduate student readers.
This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in...
|
cena:
70,04 |
![]() |
Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings
ISBN: 9783642341281 / Angielski / Miękka / 506 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Ho...
|
cena:
201,72 |
![]() |
Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012, Proc
ISBN: 9783642341342 / Angielski / Miękka / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012.
Constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in T...
|
cena:
201,72 |
![]() |
Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings
ISBN: 9783642342097 / Angielski / Miękka / 247 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management.
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in Octobe...
|
cena:
185,62 |
![]() |
Automatic Malware Analysis: An Emulator Based Approach
ISBN: 9781461455226 / Angielski / Miękka / 73 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for... Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam... |
cena:
201,72 |
![]() |
Stufen Zur Informationsgesellschaft: Festschrift Zum 65. Geburtstag Von Klaus Fuchs-Kittowski
ISBN: 9783631376423 / Niemiecki / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. -Es gibt keine eindeutige Determination der sozialen und gesellschaftlichen Entwicklung durch die wissenschaftlich-technische Entwicklung, wie dies aus technokratischer bzw. scientistischer Sicht gerne angenommen wird. Es gibt aber sicher keine soziale und gesellschaftliche Entwicklung ohne wissenschaftlich-technische Entwicklung. Es wird hochst wahrscheinlich auch keinen weiteren wissenschaftlich-technischen Fortschritt ohne sozialen Fortschritt geben, beide Entwicklungsprozesse mussen durch bewusste Gestaltung miteinander vermittelt werden.-
-Die modernen Informations- und... -Es gibt keine eindeutige Determination der sozialen und gesellschaftlichen Entwicklung durch die wissenschaftlich-technische Entwicklung, wie dies au...
|
cena:
622,83 |
![]() |
Digital Communication: Principles and System Modelling
ISBN: 9783642264436 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems. The Salient features of the book are: 1. The foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language. 2. The application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally. 3.... "Digital Communications" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. The boo... |
cena:
403,47 |
![]() |
Codes, Designs and Geometry
ISBN: 9781461286189 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Codes, Designs, and Geometry brings together in one place important contributions and up-to-date research results in this important area.
Codes, Designs, and Geometry serves as an excellent reference, providing insight into some of the most important research issues in the field. Codes, Designs, and Geometry brings together in one place important contributions and up-to-date research results in this important area. |
cena:
605,23 |