![]() |
Statistical Mining and Data Visualization in Atmospheric Sciences
ISBN: 9780792378167 / Angielski / Twarda / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Statistical Mining and Data Visualization in Atmospheric Sciences brings together in one place important contributions and up-to-date research results in this fast moving area.
Statistical Mining and Data Visualization in Atmospheric Sciences serves as an excellent reference, providing insight into some of the most challenging research issues in the field. Statistical Mining and Data Visualization in Atmospheric Sciences brings together in one place important contributions and up-to-date researc...
|
cena:
402,53 |
![]() |
Constraints and Databases
ISBN: 9780792380450 / Angielski / Twarda / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constraints and Databases contains seven contributions on the rapidly evolving research area of constraints and databases. This collection of original research articles has been compiled as a tribute to Paris C. Kanellakis, one of the pioneers in the field.
Constraints have long been used for maintaining the integrity of databases. More recently, constraint databases have emerged where databases store and manipulate data in the form of constraints. The generality of constraint databases makes them highly attractive for many applications. Constraints provide a uniform mechanism... Constraints and Databases contains seven contributions on the rapidly evolving research area of constraints and databases. This collection of...
|
cena:
603,81 |
![]() |
Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers
ISBN: 9783642047978 / Angielski / Twarda / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments,...
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- ...
|
cena:
402,53 |
![]() |
Progress in Cryptology - INDOCRYPT 2009: 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings
ISBN: 9783642106279 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, Indi... |
cena:
201,24 |
![]() |
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings
ISBN: 9783642104329 / Angielski / Miękka / 538 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
|
cena:
402,53 |
![]() |
e-Business and Telecommunications
ISBN: 9783642051968 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP...
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in ...
|
cena:
402,53 |
![]() |
Intelligent Image Databases: Towards Advanced Image Retrieval
ISBN: 9780792380153 / Angielski / Twarda / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intelligent Image Databases: Towards Advanced Image Retrieval addresses the image feature selection issue in developing content-based image retrieval systems. The book first discusses the four important issues in developing a complete content-based image retrieval system, and then demonstrates that image feature selection has significant impact on the remaining issues of system design. Next, it presents an in-depth literature survey on typical image features explored by contemporary content-based image retrieval systems for image matching and retrieval purposes. The goal of the...
Intelligent Image Databases: Towards Advanced Image Retrieval addresses the image feature selection issue in developing content-based image r...
|
cena:
402,53 |
![]() |
Video on Demand Systems: Technology, Interoperability and Trials
ISBN: 9780792399490 / Angielski / Twarda / 108 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Video on Demand Systems brings together in one place important contributions and up-to-date research results in this fast moving area.
Video on Demand Systems serves as an excellent reference, providing insight into some of the most challenging research issues in the field. Video on Demand Systems brings together in one place important contributions and up-to-date research results in this fast moving area.
... |
cena:
402,53 |
![]() |
Climate and Environmental Database Systems
ISBN: 9780792398325 / Angielski / Twarda / 197 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Climate and Environmental Database Systems contains the papers presented at the Second International Workshop on Climate and Environmental Database Systems, held November 21-23, 1995, in Hamburg, Germany.
Climate and environmental data may be separated into two classes, large amounts of well structured data and smaller amounts of less structured data. The large amounts are produced by numerical climate models and by satellites, handling data in the order of magnitude of 100 Tbytes for the climate modelling sites and 1000 Tbytes for the recording and processing of satellite... Climate and Environmental Database Systems contains the papers presented at the Second International Workshop on Climate and Environmental Da...
|
cena:
603,81 |
![]() |
Document Processing and Retrieval: Texpros
ISBN: 9780792396444 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Document Processing and Retrieval: TEXPROS focuses on the design and implementation of a personal, customizable office information and document processing system called TEXPROS (a TEXt PROcessing System). TEXPROS is a personal, intelligent office information and document processing system for text-oriented documents. This system supports the storage, classification, categorization, retrieval and reproduction of documents, as well as extracting, browsing, retrieving and synthesizing information from a variety of documents. When using TEXPROS in a multi-user...
Document Processing and Retrieval: TEXPROS focuses on the design and implementation of a personal, customizable office information and docume...
|
cena:
603,81 |
![]() |
Discover Entropy and the Second Law of Thermodynamics: A Playful Way of Discovering a Law of Nature
ISBN: 9789814299756 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a sequel to the author's book entitled “Entropy Demystified” (Published by World Scientific, 2007). The aim is essentially the same as that of the previous book by the author: to present Entropy and the Second Law as simple, meaningful and comprehensible concepts. In addition, this book presents a series of “experiments” which are designed to help the reader discover entropy and the Second Law. While doing the experiments, the reader will encounter three most fundamental probability distributions featuring in Physics: the Uniform, the...
This is a sequel to the author's book entitled “Entropy Demystified” (Published by World Scientific, 2007). The aim is essentiall...
|
cena:
239,99 |
![]() |
Integrated Uncertainty Management and Applications
ISBN: 9783642119590 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Solving practical problems often requires the integration of information and knowledge from many different sources, taking into account uncertainty and impreciseness. The 2010 International Symposium on Integrated Uncertainty Management and Applications (IUM'2010), which takes place at the Japan Advanced Institute of Science and Technology (JAIST), Ishikawa, Japan, between 9th-11th April, is therefore conceived as a forum for the discussion and exchange of research results, ideas for and experience of application among researchers and practitioners involved with all aspects of uncertainty...
Solving practical problems often requires the integration of information and knowledge from many different sources, taking into account uncertainty an...
|
cena:
805,10 |
![]() |
Advances in Intelligent Information and Database Systems
ISBN: 9783642120893 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Contains 32 chapters which have been based on selected submissions to the poster session organized during the 2nd Asian Conference on Intelligent Information and Database Systems (24-26 March 2010 in Hue, Vietnam). This book discusses theoretical and practical issues related to integration of artificial intelligence and database technologies.
Contains 32 chapters which have been based on selected submissions to the poster session organized during the 2nd Asian Conference on Intelligent Info...
|
cena:
603,81 |
![]() |
Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings
ISBN: 9783642117985 / Angielski / Miękka / 610 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInternationalAssociationofCryptologicResearch(IACR)andwasorganized in cooperation with the Information Security and Cryptography group at ETH Zurich.The GeneralChairsof the conferencewereMartin Hirt andUeli Maurer. The conference received 100 submissions, of which the Program Committee selected 33 for presentation at the conference. The Best Student Paper Award was given to Kai-Min Chung and Feng-Hao Liu for their paper "ParallelRepe- tion Theorems...
TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInter...
|
cena:
402,53 |
![]() |
Cyber Security: Deterrence and It Protection for Critical Infrastructures
ISBN: 9783319022789 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
|
cena:
201,24 |
![]() |
Advanced Inequalities
ISBN: 9789814317627 / Angielski / Twarda / 424 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This monograph presents univariate and multivariate classical analyses of advanced inequalities. This treatise is a culmination of the author's last thirteen years of research work. The chapters are self-contained and several advanced courses can be taught out of this book. Extensive background and motivations are given in each chapter with a comprehensive list of references given at the end.The topics covered are wide-ranging and diverse. Recent advances on Ostrowski type inequalities, Opial type inequalities, Poincare and Sobolev type inequalities, and Hardy-Opial type inequalities...
This monograph presents univariate and multivariate classical analyses of advanced inequalities. This treatise is a culmination of the author's...
|
cena:
661,20 |
![]() |
Information Theory, Evolution, and the Origin of Life
ISBN: 9780521169585 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Theory, Evolution and the Origin of Life presents a timely introduction to the use of information theory and coding theory in molecular biology. The genetical information system, because it is linear and digital, resembles the algorithmic language of computers. George Gamow pointed out that the application of Shannon's information theory breaks genetics and molecular biology out of the descriptive mode into the quantitative mode and Dr Yockey develops this theme, discussing how information theory and coding theory can be applied to molecular biology. He discusses how these tools...
Information Theory, Evolution and the Origin of Life presents a timely introduction to the use of information theory and coding theory in molecular bi...
|
cena:
311,83 |
![]() |
Classification and Multivariate Analysis for Complex Data Structures
ISBN: 9783642133114 / Angielski / Miękka / 473 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume covers the latest advances in data analysis methods for multidimensional data which can present a complex structure. Special attention is paid to new methodological contributions from both the theoretical and the applicative point of views. This volume covers the latest advances in data analysis methods for multidimensional data which can present a complex structure. Special attention ... |
cena:
402,53 |
![]() |
Data Mining - a search for knowledge
ISBN: 9783656296034 / Angielski / Miękka / 28 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
153,35 |
![]() |
Towards Hardware-Intrinsic Security: Foundations and Practice
ISBN: 9783642144516 / Angielski / Twarda / 407 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...
|
cena:
603,81 |