Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... | | Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex
systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is
usually not taught at ... | | European Robotics Symposium 2006 (Springer Tracts in Advanced Robotics)This unique reference represents a cross-section of forefront robotics research, ranging from robotics and systems to learning, autonomy and failure detection, from vision and navigation to localization and mapping, which are based on the papers presented at the 1st European Robotics Symposium (EUROS-06) held in Palermo, Italy from 16-18 March,... |