for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management;
Bemærk: Kan ikke leveres før jul.
Building on Magnani's manipulative abduction, the accompanying classification of abduction, and the hybrid concept of abduction as... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
Bemærk: Kan ikke leveres før jul.
Current and historical research methods in approximation theory are presented in this book beginning with the 1800s and following the evolution of approximation theory via the refinement and extension of classical methods and ending with recent techniques and methodologies.
Bemærk: Kan ikke leveres før jul.
This volume gathers contributions reflecting topics presented during an INDAM workshop held in Rome in May 2016. The book offers a unique resource, both for young... Læs mere
Bemærk: Kan ikke leveres før jul.
This book generalizes and extends the available theory in robust and decentralized hypothesis testing. The theory of robust detection is extended to robust... Læs mere
Bemærk: Kan ikke leveres før jul.
This book comprises nine selected works on numerical and computational methods for solving multiobjective optimization, game theory, and machine learning problems.
Bemærk: Kan ikke leveres før jul.
This book is offers a comprehensive overview of information theory and error control coding, using a different approach then in existed literature. Although... Læs mere
Bemærk: Kan ikke leveres før jul.
This book extends current understandings of the effects of using locative social media on spatiality, the experience of time and identity.
Bemærk: Kan ikke leveres før jul.
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are... Læs mere
Bemærk: Kan ikke leveres før jul.