 |
|
|
 Programming Many-Core Chips
Parallel computing has been confined, for much of its over 40 year history, to highly
specialized, technology-wise advanced domains such as scientific computing or
telecommunications. There were only a few experts who had the background and
experience to write efficient, robust and scalable programs for these parallel machines.
... |  |  Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,... |  |  Cryptography Engineering: Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the... |
|
|
|
Result Page: 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 |