Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 11340 dokumen yang sesuai dengan query
cover
Martin Charles Golumbic, editor
"This book constitutes the thoroughly refereed proceedings of the 38th International Workshop on Graph Theoretic Concepts in Computer Science (WG 2012) held in Jerusalem, Israel on June 26-28, 2012. The 29 revised full papers presented were carefully selected and reviewed from 78 submissions. The papers are solicited describing original results on all aspects of graph-theoretic concepts in Computer Science, e.g. structural graph theory, sequential, parallel, randomized, parameterized, and distributed graph and network algorithms and their complexity, graph grammars and graph rewriting systems, graph-based modeling, graph-drawing and layout, random graphs, diagram methods, and support of these concepts by suitable implementations. The scope of WG includes all applications of graph-theoretic concepts in Computer Science, including data structures, data bases, programming languages, computational geometry, tools for software construction, communications, computing on the web, models of the web and scale-free networks, mobile computing, concurrency, computer architectures, VLSI, artificial intelligence, graphics, CAD, operations research, and pattern recognition
"
Berlin: Springer, 2012
e20406836
eBooks  Universitas Indonesia Library
cover
Ari Juels, editor
"This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID."
Berlin: Springer-Verlag, 2012
e20407984
eBooks  Universitas Indonesia Library
cover
"This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds."
Heidelberg: Springer, 2012
e20408219
eBooks  Universitas Indonesia Library
cover
Paul Groth, editor
"This book constitutes the revised selected papers of the 4th International Provenance and Annotation Workshop, IPAW 2012, held in Santa Barbara, CA, USA, in June 2012. The 14 full papers, 4 demo papers and 12 poster papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on documents databases, the web, reconstruction, science applications, and demonstrations."
Berlin: Springer, 2012
e20407167
eBooks  Universitas Indonesia Library
cover
Dirk Pattinson, editor
"his book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, colocated with ETAPS 2012, held in Tallin, Estonia, in March/April 2012. The 10 revised full papers were carefully reviewed and selected from 23 submissions. Also included are three invited talks. The papers cover a wide range of topics in the theory, logics and applications of coalgebras."
Berlin: Springer-Verlag , 2012
e20406358
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2011, held in Stavanger, Norway, in September 2011. The 66 revised and extended full papers were carefully reviewed and selected from 124 papers presented at the conference. The papers are organized in 3 parts: production process, supply chain management, and strategy. They represent the breadth and complexity of topics in operations management, ranging from optimization and use of technology, management of organizations and networks, to sustainable production and globalization. The authors use a broad range of methodological approaches spanning from grounded theory and qualitative methods, via a broad set of statistical methods to modeling and simulation techniques."
Heidelberg: Springer-Verlag, 2012
e20408529
eBooks  Universitas Indonesia Library
cover
Michael J. Dinneen, editor
"The research interests of Cristian Calude are reflected in the topics covered by the 32 papers included in this book, namely, algorithmic information theory, algorithms, automata and formal languages, computing and natural sciences, computability and applications, logic and applications, philosophy of computation, physics and computation, and unconventional models of computation. They have been organized into four parts. The first part consists of papers discussing his life achievements. This is followed by papers in the three general areas of complexity, computability, and randomness; physics, philosophy (and logic), and computation; and algorithms, automata, and formal models (including unconventional computing)."
Berlin: [Springer-Verlag, ], 2012
e20408844
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies."
Berlin: Springer-Verlag, 2012
e20409034
eBooks  Universitas Indonesia Library
cover
"This volume constitutes the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, WISTP 2012, held in Egham, UK, in June 2012. The 9 revised full papers and 8 short papers presented together with three keynote speeches were carefully reviewed and selected from numerous submissions. They are organized in topical sections on protocols, privacy, policy and access control, multi-party computation, cryptography, and mobile security."
Heidelberg: Springer, 2012
e20410469
eBooks  Universitas Indonesia Library
cover
Anne Canteaut, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak."
Heidelberg : Springer, 2012
e20407294
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>