 |
|
 Combinatorial Algorithms: 22th International Workshop, IWOCA 2011
This volume contains the papers presented at IWOCA 11: the 22nd International
Workshop on Combinatorial Algorithms
The 22nd IWOCA was held July 20–22, 2011 on the green and spacious campus of the University of Victoria (UVic), itself located on green and spacious Vancouver ... |  |  Microsoft Outlook 2010: Complete (Shelly Cashman)
The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are
proud that since Mircosoft Offi ce 4.3, our series of Microsoft Offi ce textbooks have been
the most widely used books in education. With each new edition of our Offi ce books,
we make signifi cant improvements based on the software and comments... |  |  |
|
 Data Structures and Algorithms in Java
This international student version of Data Structures and Algorithms in Java provides an introduction to data structures and algorithms, including their design, analysis, and implementation. In terms of curricula based on the IEEEIACM 2001 Computing Curriculum, this book is appropriate for use in the courses CS102 (1I01B versions), CS103... |  |  Principles of Communications Networks and Systems
This book addresses the fundamentals of communications systems and networks, providing
models and analytical methods for evaluating their performance. It is divided into ten chapters,
which are the result of a joint effort by the authors and contributors. The authors and the
contributors have a long history of collaboration, both in... |  |  Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... |
|
|
|
Result Page: 113 112 111 110 109 108 107 106 105 104 103 102 101 |