Home | Amazing | Today | Tags | Publishers | Years | Search 
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara
Advances in Cryptology -- CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized...

Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10
Unconventional Computation: 10th International Conference, UC 2011, Turku, Finland, June 6-10

The 10th International Conference on Unconventional Computation, UC 2011, was organized under the auspices of EATCS and Academia Europaea, by the Department of Mathematics of the University of Turku (Turku, Finland), and the Center for Discrete Mathematics and Theoretical Computer Science (Auckland, New Zealand). The event was held in...

Advanced Topics in Information Retrieval (The Information Retrieval Series)
Advanced Topics in Information Retrieval (The Information Retrieval Series)

This book presents a wide-spectrum illustration of what research in Information Retrieval has produced or will produce in the next years. The book content includes chapters on Aggregated Search, Digital Advertising, Digital Libraries, Discovery of Spam and Opinions in the Web, Evaluation, Information Retrieval in Context, Multimedia...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Analytical Methods for Food Additives (Woodhead Publishing Series in Food Science, Technology and Nutrition)
Analytical Methods for Food Additives (Woodhead Publishing Series in Food Science, Technology and Nutrition)

Additives are added to food to perform different technological functions, for example, to increase shelf life (preservatives), or to protect against rancidity (antioxidants). The use of additives in food is controlled by separate legislation relating to, for example, colours in food, sweeteners, miscellaneous additives (other than...

Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii
Algorithms and Computation: 20th International Symposium, ISAAC 2009, Honolulu, Hawaii

The papers in this volume were presented at the 20th Annual International Symposium on Algorithms and Computation, held December 16–18, 2009, in Hawaii, USA. In response to the Call-for-Papers, 279 papers were submitted. Each paper received at least three reviews by either Program Committee members or experts selected by Program...

Problems and Solutions on Electromagneti (Major American Universities Ph.D. Qualifying Questions and Solutions)
Problems and Solutions on Electromagneti (Major American Universities Ph.D. Qualifying Questions and Solutions)
This series of physics problems and solutions, which consists of seven volumes — Mechanics, Electromagnetism, Optics, Atomic, Nuclear and Particle Physics, Thermodynamics and Statistical Physics, Quantum Me chanic, Solid State Physics and Relativity, contains a selection of 2550 problems from the graduate school entrance...
Suddenly in Charge: Managing Up, Managing Down, Succeeding All Around
Suddenly in Charge: Managing Up, Managing Down, Succeeding All Around
In my twenty-five-year consulting practice with about half the Fortune 500 firms, and in coaching executives and entrepreneurs globally, I’ve found a fascinating phenomenon: not enough people prepare for success!

They prepare for failure, disappointment, delay, and even cataclysm, but not necessarily for
...
Language and Automata Theory and Applications: 5th International Conference
Language and Automata Theory and Applications: 5th International Conference
These proceedings contain the papers that were presented at the 5th International Conference on Language and Automata Theory and Applications (LATA 2011), held in Tarragona, Spain, during May 26–31, 2011.

The scope of LATA is rather broad, including: algebraic language theory; algorithms for semi-structured
...
Visual Basic 2012 Programmer's Reference
Visual Basic 2012 Programmer's Reference
IT HAS BEEN SAID THAT SIR ISAAC NEWTON was the last person to know everything. He was an accomplished physicist (his three laws of motion were the basis of classical mechanics, which defi ned astrophysics for three centuries), mathematician (he was one of the inventors of calculus and developed Newton’s Method for fi nding...
Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)
Applications of Soft Computing: From Theory to Praxis (Advances in Intelligent and Soft Computing)

The World Soft Computing (WSC) conference is an annual international online conference on applied and theoretical soft computing technology. This WSC 2008 is the thirteenth conference in this series and it has been a great success.

We received a lot of excellent paper submissions which were peer-reviewed by an international...

Chemistry: An Industry-Based Laboratory Manual
Chemistry: An Industry-Based Laboratory Manual
Have you ever sat down and had an open discussion over coffee with an industrial chemist or chemical technician about his or her work? Have you ever “shadowed” a chemist or a chemical technician for a day as he or she went about the daily routine in an industrial or government laboratory? If you have done these things,...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy