Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book constitutes revised selected papers from 7 workshops that were held in conjunction with the ISC High Performance 2016 conference in Frankfurt, Germany, in June 2016. and International Workshop on Performance Portable Programming Models for Accelerators, P3MA.
This book constitutes the refereed proceedings of the 39th Annual German Conference on Artificial Intelligence, KI 2016, in conjunction with the Österreichische Gesellschaft für Artificial Intelligence, ÖGAI, held in Klagenfurt, Austria, in September 2016.The 8 revised full technical papers presented together with 12 technical communications, and 16 extended abstracts were carefully reviewed and selected from 44 submissions.The conference provides the opportunity to present a wider range of results and ideas that are of interest to the KI audience, including reports about recent own publications, position papers, and previews of ongoing work.
This book constitutes the refereed proceedings of the 23rd International Symposium on String Processing and Information Retrieval, SPIRE 2016, held in Beppu, Japan, in October 2016.
This book constitutes the refereed proceedings of the 10th International Workshop on Reachability Problems, RP 2016, held in Aalborg, Denmark, in September 2016. The papers cover a range of topics in the field of reachability for infinite state systems;
This book constitutes the thoroughly refereed post-conference proceedings of the 25th Australian Conference on Computer-Human Interaction, OzCHI 2013, held in Adelaide, SA, Australia, in November 2013. The 11 revised extended papers were carefully reviewed and selected from 192 submissions and cover topics on multi-dimensional interaction;
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. low-level vision and features;
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014.
This book constitutes the refereed proceedings of the Cryptographer''s Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms and homomorphic encryption and its applications.
This book constitutes the refereed proceedings of the 19th Annual International Conference on Research in Computational Molecular Biology, RECOMB 2015, held in Warsaw, Poland, in April 2015. They report on original research in all areas of computational molecular biology and bioinformatics.
The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.
This book and its companion volumes, LNCS volumes 9140, 9141 and 9142, constitute the proceedings of the 6th International Conference on Swarm Intelligence, ICSI 2015 held in conjunction with the Second BRICS Congress on Computational Intelligence, CCI 2015, held in Beijing, China in June 2015.
This book and its companion volumes, LNCS volumes 9140, 9141 and 9142, constitute the proceedings of the 6th International Conference on Swarm Intelligence, ICSI 2015 held in conjunction with the Second BRICS Congress on Computational Intelligence, CCI 2015, held in Beijing, China in June 2015.
This book and its companion volumes, LNCS volumes 9140, 9141 and 9142, constitute the proceedings of the 6th International Conference on Swarm Intelligence, ICSI 2015 held in conjunction with the Second BRICS Congress on Computational Intelligence, CCI 2015, held in Beijing, China in June 2015.
The 19 selected papers presented were carefully revised and report from the four workshops: computational social networks, IWCSN 2014, enterprise social networks, Org2 2014, personalization and context-awareness in cloud and service computing, PCS 2014, and data quality and trust in big data, QUAT 2014.
This book constitutes the refereed proceedings of the 7th International Conference on Social Computing and Social Media, SCSM 2015, held as part of the 17th International Conference on Human-Computer Interaction, HCII 2015, held in Los Angeles, CA, USA, in August 2015.
This book constitutes the refereed proceedings of the 8th International Conference on Functional Imaging and Modeling of the Heart, held in Maastricht, The Netherlands, in June 2015. The 54 revised full papers were carefully reviewed and selected from 72 submissions. models of mechanics; and models of electrophysiology.
This book constitutes the refereed proceedings of the 10th International Conference on Persuasive Technology, PERSUASIVE 2015, held in Chicago, IL, USA in June 2015. The papers are grouped in topical sections on understanding individuals, empowering individuals and understanding and empowering communities.
This book constitutes the proceedings of the 10th International Computer Science Symposium in Russia, CSR 2015, held in Listvyanka, Russia, in July 2015. The 25 full papers presented in this volume were carefully reviewed and selected from 61 submissions.
This book constitutes the proceedings of the 20th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2015, Oslo, Norway, in June 2015. The 12 papers presented in this volume were carefully reviewed and selected from 20 submissions. They are organized in topical sections: applications;
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed andselected from 137 submissions.
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed andselected from 137 submissions.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.