Home | Amazing | Today | Tags | Publishers | Years | Search 
Rule-Based Reasoning, Programming, and Applications: 5th International Symposium, RuleML 2011
Rule-Based Reasoning, Programming, and Applications: 5th International Symposium, RuleML 2011

The 5th International Symposium on Rules: Research Based and Industry Focused (RuleML-2011@IJCAI), collocated in Barcelona, Spain, with the 22nd International Joint Conference on Artificial Intelligence, was the premier place to meet and to exchange ideas from all fields of rule technology. The aim of RuleML-2011 was to build a bridge between...

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011
Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011

It was a real pleasure to have taken part in organizing the 10th International Conference on Cryptography and Network Security (CANS 2011). It was held during December 10–12, 2011, at the International Asia Pacific Convention Center in Sanya, on the subtropical island of Hainan (China). CANS 2011 was sponsored by the National...

Databases in Networked Information Systems: 7th International Workshop, DNIS 2011
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011

Large-scale information systems in public utility services depend on computing infrastructure. Many research efforts are being made in related areas, such as cloud computing, sensor networks, mobile computing, high-level user interfaces and information accesses by Web users. Government agencies in many countries plan to launch...

Advances in Databases and Information Systems: Third East European Conference, ADBIS'99, Maribor, Slovenia,
Advances in Databases and Information Systems: Third East European Conference, ADBIS'99, Maribor, Slovenia,

The 3rd Eastern European Conference on Advances in Databases and Information Systems (ADBIS’99) took place on 13-16- September 1999, in Maribor, Slovenia. It was organized in cooperation with ACM SIGMOD, the Moscow chapter of ACM SIGMOD, Slovenian Society Informatika, and the Slovenian Ministry of Technology.

The aim...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

A Decade of Concurrency: Reflections and Perspectives. REX School/Symposium Noordwijkerhout, The Netherlands
A Decade of Concurrency: Reflections and Perspectives. REX School/Symposium Noordwijkerhout, The Netherlands

The REX School/Symposium *A Decade of Concurrency - Reflections and Perspectives' was the final event of a ten year period of cooperation between three Dutch research groups working on the foundations of concurrency. Ever since its inception in 1983. the goal of the project has been'to contribute to the crossfertilization...

Handbook of FPGA Design Security
Handbook of FPGA Design Security

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical...

Designing Interactive Systems: People, Activities, Contexts, Technologies
Designing Interactive Systems: People, Activities, Contexts, Technologies

Designing Interactive Systems: People, Activities, Contexts, Technologies is an exciting, new, forward-looking textbook in Human Computer Interaction (HCI). Authoritative in its coverage, this innovative book takes a top-down approach, starting with what is familiar to students and working down to theory/abstract underpinnings. This makes it...

CUDA by Example: An Introduction to General-Purpose GPU Programming
CUDA by Example: An Introduction to General-Purpose GPU Programming

CUDA is a computing architecture designed to facilitate the development of parallel programs. In conjunction with a comprehensive software platform, the CUDA Architecture enables programmers to draw on the immense power of graphics processing units (GPUs) when building high-performance applications. GPUs, of course, have...

Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Location-Based Services Handbook: Applications, Technologies, and Security
Location-Based Services Handbook: Applications, Technologies, and Security

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of...

The Facebook Effect: The Inside Story of the Company That Is Connecting the World
The Facebook Effect: The Inside Story of the Company That Is Connecting the World

IN LITTLE MORE THAN HALF A DECADE, Facebook has gone from a dorm-room novelty to a company with 500 million users. It is one of the fastest growing companies in history, an essential part of the social life not only of teenagers but hundreds of millions of adults worldwide. As Facebook spreads around the globe, it creates surprising...

Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy