You are holding the proceedings of FSE 2011, the 18th International Workshop
on Fast Software Encryption. This workshop was organized in cooperation with
the International Association for Cryptologic Research. It was held in Lyngby,
Denmark, during February 13–16, 2011.
The FSE 2011 Program Committee (PC) consisted of...
On March 10, 1876, Alexander Graham Bell made the first successful telephone call. As
with many things, the test was purely accidental. Graham spilled acid on his leg, and
Watson, his assistant, heard his call for help through the telephone. So, what has changed
over the last 129 years? It would be easier to discuss what hasn’t...
The ultimate reference and guide to the GNU image manipulation program
GIMP is a free, Photoshop-like image manipulation program, and as its use grows, so does the demand for detailed instruction on how to get the very most out of it. GIMP Bible is the most comprehensive and current independent GIMP reference...
With all the fantastic Cisco documentation available online, why does the world of
UCCE need this book? UCCE is such a big topic that it would be easy to think that it is
possible to try and cover absolutely everything. Unfortunately, this would turn this book
into nothing more than a product reference manual that could potentially be...
If you have an abundance of data, but no idea what to do with it, this book was written for you! Packed with examples from an array of industries, Introduction to Data Mining Using SAS Enterprise Miner provides you with excellent starting points and practical guidelines to begin data mining today. Author Patricia Cerrito encourages you to...
Numerous textbooks address software testing in a structured development environment.
By “structured” is meant a well-defined development cycle in which discretely
defined steps provide measurable outputs at each step. It is assumed that
software testing activities are based on clearly defined requirements and software...
Our interest in human–computer interaction started with our participation in the TT2
project (“Trans–Type-2”, 2002–2005—http://www.tt2.atosorigin.es), funded by the
European Union (EU) and coordinated by Atos Origin, which dealt with the development
of statistical-based technologies for computer...
Gaining access to the interactive learning activities on this Online Companion is
easy—all you need to do is create a user profile. This simple, one-time process
establishes you as a user in the CoursePort authentication system. By utilizing the
Online Companion, students and instructors can reinforce the concepts they’re...
With the overall complexity involved in creating games becoming exceedingly difficult and
expensive with every successive console generation, many game developers have turned
to middleware engines, such as the CryENGINE, that offer a complete pipeline for the game
development process. CryENGINE is a perfect fit for most developers as it...
Why should a Java developer learn about functional programming (FP)? After all, hasn’t
functional programming been safely hidden in academia for decades? Isn’t objectoriented
programming (OOP) all we really need? This book explains why functional
programming has become an important tool for the challenges of our time and how...
I am not an expert. I have never claimed to be an expert at anything
(at least not seriously done so), least of all an expert in forensic
analysis. I am not an expert in Windows Registry analysis. I am
simply, by profession, a responder and analyst with some work
and research experience in this area. I have also performed a
number...