Home | Amazing | Today | Tags | Publishers | Years | Search 
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002

SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a...

Managing and Mining Uncertain Data (Advances in Database Systems)
Managing and Mining Uncertain Data (Advances in Database Systems)

Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods...

Ubuntu Unleashed 2011 Edition: Covering 10.10 and 11.04 (6th Edition)
Ubuntu Unleashed 2011 Edition: Covering 10.10 and 11.04 (6th Edition)

We are pleased to present the 2011 edition of Ubuntu Unleashed. Ubuntu is a Linux-based computer operating system that has taken the world by storm. From its humble beginning in 2004, Ubuntu has risen to be the vanguard of desktop Linux, as well as a popular choice for servers.

 

...
Practical Data Structures in C++
Photoshop Elements 9 All-in-One For Dummies
Photoshop Elements 9 All-in-One For Dummies

Photoshop Elements has evolved over several generations to become a sophisticated photo editor. What was once a low-end, consumer-grade product is now a tool for novice photo editors, amateur photographers, and professionals alike.

Elements shines on its own turf and is distinguished from Adobe Photoshop in many ways. Not only a...

One-to-One Web Marketing: Build a Relationship Marketing Strategy One Customer at a Time, Second Edition
One-to-One Web Marketing: Build a Relationship Marketing Strategy One Customer at a Time, Second Edition

Markets are becoming increasingly fragmented as the result of global competition. As more companies vie for niche market positions, they spin out a broader array of product and service offerings. The Web, with its relatively low barriers to entry, has accelerated this competition by orders of magnitude. The wide availability of online...

Foundations of Computing
Foundations of Computing

It may sound surprising that in computing, a field which develops so fast that the future often becomes the past without having been the present, there is nothing more stable and worthwhile learning than its foundations.

It may sound less surprising that in a field with such a revolutionary methodological impact on all sciences and...

Mobile Networks and Management: First International Conference
Mobile Networks and Management: First International Conference

The First International ICST Conference on Mobile Networks and Management (MONAMI) was held in Athens, Greece during October 13–14, 2009, hosted by the National Technical University of Athens. Through what we hope will be a long-lasting series of events, this new international conference aims at bringing together top researchers,...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

An Introduction to MultiAgent Systems
An Introduction to MultiAgent Systems

Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...

Pattern Calculus: Computing with Functions and Structures
Pattern Calculus: Computing with Functions and Structures

The pattern calculus is a new foundation for computation, in which the expressive power of functions and of data structures are combined within pattern-matching functions. The best existing foundations focus on either functions, as in the lambda-calculus, or on data structures, as in Turing machines, or on compromises involving both, as in...

Result Page: 174 173 172 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy