![]() |
Ein polynomialer Alogrithmus zur Erkennung der Isomorphie von Graphen
ISBN: 9783640115006 / Niemiecki / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Doktorarbeit / Dissertation aus dem Jahr 2002 im Fachbereich Informatik - Theoretische Informatik, Note: 1,7, Universitat Potsdam, 19 Quellen im Literaturverzeichnis, Sprache: Deutsch, Abstract: Zusammenfassung: Die vorliegende Arbeit zeigt eine Moglichkeit, die lsomorphie zweier Graphen in polynomialer Zeit nachzuweisen. Die Korrektheit des vorgestellten Algorithmus wird nicht bewiesen, aber es wird eine Reihe von Plausibilitaten aufgelistet, die eine Korrektheit sehr wahrscheinlich erscheinen lasst. Kern des Algorithmus ist die Venrvendung der neu eingefuhrten Graphkantenprodukte und...
Doktorarbeit / Dissertation aus dem Jahr 2002 im Fachbereich Informatik - Theoretische Informatik, Note: 1,7, Universitat Potsdam, 19 Quellen im Liter...
|
cena:
240,74 |
![]() |
Database Machines: Fourth International Workshop Grand Bahama Island, March 1985
ISBN: 9780387962009 / Angielski / Miękka / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the papers presented at the Fourth International Workshop on Database Machines. The papers cover a wide spectrum of topics including descrip tions of database machine implementations. analysis of algorithms and database machine components. architectures for knowledge management. recovery and con currency control issues. and solutions to the 110 bottleneck problem. As at the pre vious workshops in Florence. San Diego. and Munich. a diverse collection of coun tries. universities. research labs. and database machine vendors were represented by the authors and conference...
This volume contains the papers presented at the Fourth International Workshop on Database Machines. The papers cover a wide spectrum of topics includ...
|
cena:
201,24 |
![]() |
Advances in Classification and Data Analysis
ISBN: 9783540414889 / Angielski / Miękka / 378 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains a selection of papers presented at the biannual meeting of the Classification and Data Analysis Group of Societa Italiana di Statistica, which was held in Rome, July 5-6, 1999. From the originally submitted papers, a careful review process led to the selection of 45 papers presented in four parts as follows: CLASSIFICATION AND MULTIDIMENSIONAL SCALING Cluster analysis Discriminant analysis Proximity structures analysis and Multidimensional Scaling Genetic algorithms and neural networks MUL TIV ARIA TE DATA ANALYSIS Factorial methods Textual data analysis Regression...
This volume contains a selection of papers presented at the biannual meeting of the Classification and Data Analysis Group of Societa Italiana di Stat...
|
cena:
402,53 |
![]() |
Chaos-Based Cryptography: Theory, Algorithms and Applications
ISBN: 9783642205415 / Angielski / Twarda / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers... Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic sys... |
cena:
603,81 |
![]() |
Information and Meaning: An Evolutionary Perspective
ISBN: 9783540761396 / Angielski / Miękka / 255 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Designed to clarify issues relating to the concept of information, this volume aims to develop a science of information and to study a pattern of interrelated phenomena which extends throughout nature. It covers a range of territory, from the nature of information to how neurons create thought.
Designed to clarify issues relating to the concept of information, this volume aims to develop a science of information and to study a pattern of inte...
|
cena:
402,53 |
![]() |
An Integrated Approach to Software Engineering
ISBN: 9781441935441 / Angielski / Miękka / 566 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An introductory course in Software Engineering remains one of the hardest subjects to teach. Much of the difficulty stems from the fact that Software Engineering is a very wide field which includes a wide range of topics. Con- sequently, what should be the focus of an introductory course remains a challenge with many possible viewpoints. This third edition of the book approaches the problem from the perspec- tive of what skills a student should possess after the introductory course, particularly if it may be the only course on software engineering in the stu- dent's program. The goal of this...
An introductory course in Software Engineering remains one of the hardest subjects to teach. Much of the difficulty stems from the fact that Software ...
|
cena:
297,70 |
![]() |
Algebraic Aspects of the Advanced Encryption Standard
ISBN: 9781441937292 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work...
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent R...
|
cena:
422,66 |
![]() |
Cryptographics: Exploiting Graphics Cards for Security
ISBN: 9781441939647 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs... Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult... |
cena:
402,53 |
![]() |
Computer Viruses and Malware
ISBN: 9781441940162 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware... Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger... |
cena:
523,30 |
![]() |
Multivariate Public Key Cryptosystems
ISBN: 9781441940773 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative. Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. The first chapter is an introduction to the basic ideas and early development of both... Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly be... |
cena:
483,04 |
![]() |
Malware Detection
ISBN: 9781441940957 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have... Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi... |
cena:
1207,67 |
![]() |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 9781441940964 / Angielski / Miękka / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. Secure Localization and Time... Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the n... |
cena:
827,64 |
![]() |
Artificial Intelligence Applications and Innovations: 3rd Ifip Conference on Artificial Intelligence Applications and Innovations (Aiai), 2006, June 7
ISBN: 9781441941688 / Angielski / Miękka / 744 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. The ever expanding abundance of information and computing power enables researchers and users to tackle higly interesting issues for the first time, such as applications providing personalized access and interactivity to multimodal information based on preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. The purpose of the 3rd IFIP Conference on Artificial Intelligence... Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. ... |
cena:
603,81 |
![]() |
Information Theory and Network Coding
ISBN: 9781441946300 / Angielski / Miękka / 580 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last few years have witnessed the rapid development of network coding into a research ?eld of its own in information science. With its root in infor- tion theory, network coding has not only brought about a paradigm shift in network communications at large, but also had signi?cant in?uence on such speci?c research ?elds as coding theory, networking, switching, wireless c- munications, distributeddatastorage, cryptography, andoptimizationtheory. While...
This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last f...
|
cena:
261,63 |
![]() |
Topics in Geometry, Coding Theory and Cryptography
ISBN: 9789048173457 / Angielski / Miękka / 201 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory. This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles. The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry ... |
cena:
201,24 |
![]() |
Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing
ISBN: 9781609605537 / Angielski / Twarda / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cognitive informatics is a multidisciplinary field that acts as the bridge between natural science and information science. Specifically, it investigates the potential applications of information processing and natural intelligence to science and engineering disciplines. Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing examines innovative research in the emerging, multidisciplinary field of cognitive informatics. Researchers, practitioners and students can benefit from discussions of the connections between natural science and informatics that are...
Cognitive informatics is a multidisciplinary field that acts as the bridge between natural science and information science. Specifically, it investiga...
|
cena:
922,53 |
![]() |
Vlsi-Soc: Advanced Topics on Systems on a Chip: A Selection of Extended Versions of the Best Papers of the Fourteenth International Conference on Very
ISBN: 9781441947086 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 15th conference was held at the Georgia Institute of Technology, Atlanta, USA (October 15-17, 2007). Previous conferences have taken place in Edinburgh, Trondheim, Vancouver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth and Nice. The purpose of this conference, sponsored by IFIP TC 10 Working Group 10.5 and by the...
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 Internati...
|
cena:
402,53 |
![]() |
Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings
ISBN: 9783642101908 / Angielski / Miękka / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in J...
|
cena:
402,53 |
![]() |
Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings
ISBN: 9783642209000 / Angielski / Miękka / 295 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. This title covers a range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2...
|
cena:
201,24 |
![]() |
Beginning T-SQL 2012
ISBN: 9781430237044 / Angielski / Miękka / 456 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Beginning T-SQL 2012 is the first step toward learning the T-SQL language that underlies Microsoft's SQL Server database engine. T-SQL is essential in writing SQL statements to get data into and out of a database. T-SQL is the foundation for business logic embedded in the database in the form of stored procedures and functions. Beginning T-SQL 2012 starts you on the path to mastering T-SQL, with an emphasis on best practices and sound coding techniques.
Beginning T-SQL 2012 begins with an introduction to databases, normalization, and to SQL Server Management... Beginning T-SQL 2012 is the first step toward learning the T-SQL language that underlies Microsoft's SQL Server database engine. T-SQL is ess...
|
cena:
201,24 |