for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The aim of this book is to advocate and promote network models of linguistic systems that are both based on thorough mathematical models and substantiated in terms of linguistics.
Bemærk: Kan ikke leveres før jul.
In particular, a general model for studying time evolution of transition networks, deflection routing in complex networks, recommender... Læs mere
Bemærk: Kan ikke leveres før jul.
Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES, AES, PRESENT,... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The Handbook on Ontologies provides a comprehensive overview of the current status and future prospects of the field, which has developed significantly in the five years since the first edition. Revisions here include 21 completely new chapters.
Bemærk: Kan ikke leveres før jul.
This comprehensive collection of lectures by leading experts in the field introduces and reviews all relevant... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explores the modeling and implementation of self-architecturing systems. It examines the programmability and computational abilities of self-organization and presents core principles and best practices for the design and engineering of such systems.
Bemærk: Kan ikke leveres før jul.
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security).
Bemærk: Kan ikke leveres før jul.
In particular, a general model for studying time evolution of transition networks, deflection routing in complex networks, recommender... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents the basics of quantum information, e.g., foundation of quantum theory, quantum algorithms, quantum entanglement, quantum entropies, quantum... Læs mere
Bemærk: Kan ikke leveres før jul.
This book covers the management of information security, the economics of information security, the economics of privacy, and the economics of cybercrime.
Bemærk: Kan ikke leveres før jul.
This book examines physically unclonable functions in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in information security applications.