This volume includes a selection of papers presented at the second workshop on Robot Kinematics held in Linz, September 10-12, 1990. The papers present new results and overviews on various aspects of robot kinematics such as modelling and computation...Loe edasi...
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science a...Loe edasi...
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science a...Loe edasi...
See a Mesos-based big data stack created and the components used. You will use currently available Apache full and incubating systems. The components are introduced by example and you learn how they work together.In the Complete Guide to Open Source...Loe edasi...
See a Mesos-based big data stack created and the components used. You will use currently available Apache full and incubating systems. The components are introduced by example and you learn how they work together.In the Complete Guide to Open Source...Loe edasi...
The book focuses on the state-of-the-art technologies pertaining to advances in soft computing, intelligent system and applications. The Proceedings of ASISA 2016 presents novel and original work in soft computing, intelligent system and applications...Loe edasi...
The book focuses on the state-of-the-art technologies pertaining to advances in soft computing, intelligent system and applications. The Proceedings of ASISA 2016 presents novel and original work in soft computing, intelligent system and applications...Loe edasi...
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art...Loe edasi...
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art...Loe edasi...
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh ins...Loe edasi...
David Forster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems - motivated by the large number of recent security incidents and revelations about mass surveillance...Loe edasi...
(Ilmumisaeg: 18-May-2017, PDF+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319505008)
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or paymen...Loe edasi...
(Ilmumisaeg: 18-May-2017, EPUB+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319505008)
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or paymen...Loe edasi...
Miguel Heredia Conde aims at finding novel ways to fit the valuable mathematical results of the Compressive Sensing (CS) theory to the specific case of the Photonic Mixer Device (PMD).To this end, methods are presented that take profit of the sparsit...Loe edasi...
(Ilmumisaeg: 05-Apr-2017, PDF+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319570488)
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomor...Loe edasi...
Denise Demirel, Lucas Schabhüser, Johannes Buchmann
Sari: SpringerBriefs in Computer Science
(Ilmumisaeg: 27-Mar-2017, PDF+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319537986)
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highli...Loe edasi...
Denise Demirel, Lucas Schabhüser, Johannes Buchmann
Sari: SpringerBriefs in Computer Science
(Ilmumisaeg: 27-Mar-2017, EPUB+DRM, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319537986)
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highli...Loe edasi...
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and network...Loe edasi...
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and network...Loe edasi...
Learn the fundamental foundations and concepts of the Apache HBase (NoSQL) open source database. It covers the HBase data model, architecture, schema design, API, and administration.Apache HBase is the database for the Apache Hadoop framework. HBase...Loe edasi...