Home | Amazing | Today | Tags | Publishers | Years | Search 
Cognitive Radio Networking and Security: A Game-Theoretic View
Cognitive Radio Networking and Security: A Game-Theoretic View

Recent increases in demand for cognitive radio technology have driven researchers and technologists to rethink the implications of the traditional engineering designs and approaches to communications and networking. One issue is that the traditional thinking is that one should try to have more bandwidth, more resources, and more of...

International Encyclopedia of the Social Sciences (9 vol. set)
International Encyclopedia of the Social Sciences (9 vol. set)

Late in 2004 I received a telephone call from Hélène Potter, director of new product development for Macmillan Reference USA—an imprint of Gale. I did not realize immediately that it was the telephone call that would shape a large share of my intellectual activity for the next three years. In fact, I recall hearing about a...

Advances in Coding Theory and Crytography (Series on Coding Theory and Cryptology)
Advances in Coding Theory and Crytography (Series on Coding Theory and Cryptology)

Due to the increasing importance of digital communications, the area of research in coding theory and cryptography is broad and fast developing. In this book there are presented some of the latest research developments in the area. The book grew as a combination of two research conferences organized in the area: the Vlora Conference in Coding...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan
Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan

This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the International Workshop on Computational Forensics (IWCF 2010), held in Tokyo, Japan during November 11–12, 2010. The workshop took place in conjunction with the 16th Annual Scientific Meeting of the Japanese Association of Forensic Science.

...
Implementation and Application of Automata: 15th International Conference, CIAA 2010
Implementation and Application of Automata: 15th International Conference, CIAA 2010

This volume of Lecture Notes in Computer Science contains revised versions of papers presented at the 15th International Conference on Implementation and Application of Automata, CIAA 2010. The conference was held at the University of Manitoba in Winnipeg, Canada, on August 12–15, 2010. The previous CIAA conferences were held in London,...

Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010
Formal Verification of Object-Oriented Software: International Conference, FoVeOOS 2010

Formal software verification has outgrown the area of academic case studies, and industry is showing serious interest. The logical next goal is the verification of industrial software products. Most programming languages used in industrial practice are object-oriented, e.g., Java, C++, or C#. The International Conference on Formal...

Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop
Provenance and Annotation of Data and Process: Third International Provenance and Annotation Workshop

Interest in and needs for provenance are growing as data proliferate. Data are increasing in a wide array of application areas, including scientific workflow systems, logical reasoning systems, text extraction, social media, and linked data. As data volumes expand and as applications become more hybrid and distributed in nature, there is...

Logic for Programming, Artificial Intelligence, and Reasoning: 16th International Conference
Logic for Programming, Artificial Intelligence, and Reasoning: 16th International Conference

The 16th LPAR event was held in Africa for the very first time, signalling a bright future for a conference with a glowing history. For many years it was a goal of the steering committee to hold LPAR in Africa and the enthusiasm for our presence far exceeded our expectations. With the help of local organiser Waly Faye, LPAR integrated itself...

Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings

It is a pleasure and an honour both to organize ICB 2009, the 3rd IAPR/IEEE International Conference on Biometrics. This will be held 2–5 June in Alghero, Italy, hosted by the Computer Vision Laboratory, University of Sassari. The conference series is the premier forum for presenting research in biometrics and its allied technologies:...

Logical Foundations of Computer Science: International Symposium, LFCS 2007
Logical Foundations of Computer Science: International Symposium, LFCS 2007

The Symposium on Logical Foundations of Computer Science series provides a forum for the fast-growing body of work in the logical foundations of computer science, e.g., those areas of fundamental theoretical logic related to computer science. The LFCS series began with “Logic at Botik,” Pereslavl-Zalessky, 1989, which was...

Principles of Document Processing: Third International Workshop, PODP '96, Palo Alto
Principles of Document Processing: Third International Workshop, PODP '96, Palo Alto

This book constitutes the thoroughly refereed post-workshop proceedings of the Third International Workshop on Principles of Document Processing, PODP'96, held in Palo Alto, California, USA, in September 1996. The book contains 13 revised full papers presented as chapters of a coherent, monograph-like book. The papers focus equally on the...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy