Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9982 dokumen yang sesuai dengan query
cover
Anne Canteaut, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Workshop on Fast Software Encryption, held in Washington, DC, USA, in March 2012. The 24 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 89 initial submissions. The papers are organized in topical sections on block ciphers, differential cryptanalysis, hash functions, modes of operation, new tools for cryptanalysis, new designs and Keccak."
Heidelberg : Springer, 2012
e20407294
eBooks  Universitas Indonesia Library
cover
Paul Groth, editor
"This book constitutes the revised selected papers of the 4th International Provenance and Annotation Workshop, IPAW 2012, held in Santa Barbara, CA, USA, in June 2012. The 14 full papers, 4 demo papers and 12 poster papers presented were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on documents databases, the web, reconstruction, science applications, and demonstrations."
Berlin: Springer, 2012
e20407167
eBooks  Universitas Indonesia Library
cover
Radu Calinescu, editor
"This book presents the thoroughly refereed and revised post-workshop proceedings of the 17th Monterey Workshop, held in Oxford, UK, in March 2012. The workshop explored the challenges associated with the Development, Operation and Management of Large-Scale complex IT Systems. The 21 revised full papers presented were significantly extended and improved by the insights gained from the productive and lively discussions at the workshop, and the feedback from the post-workshop peer reviews."
Berlin: Springer, 2012
e20407287
eBooks  Universitas Indonesia Library
cover
A. Ridha Mahjoub, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the Second International Symposium on Combinatorial Optimization, ISCO 2012, held in Athens, Greece, in April 2012. The 37 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 94 regular and 30 short submissions. They present original research on all aspects of combinatorial optimization, ranging from mathematical foundations and theory of algorithms to computational studies and practical applications"
Berlin: Springer-Verlag , 2012
e20406376
eBooks  Universitas Indonesia Library
cover
Dirk Pattinson, editor
"his book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Coalgebraic Methods in Computer Science, CMCS 2012, colocated with ETAPS 2012, held in Tallin, Estonia, in March/April 2012. The 10 revised full papers were carefully reviewed and selected from 23 submissions. Also included are three invited talks. The papers cover a wide range of topics in the theory, logics and applications of coalgebras."
Berlin: Springer-Verlag , 2012
e20406358
eBooks  Universitas Indonesia Library
cover
Franciso Duran, editor
"This book constitutes the thoroughly refereed post-workshop proceedings of the 9th International Workshop on Rewriting Logic and its Applications, WRLA 2012, held as a satellite event of ETAPS 2012, in Tallinn, Estonia, in March 2012. The 8 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 12 initial submissions and 5 invited lectures. The papers address a great diversity of topics in the fields of rewriting logic such as: foundations and models, languages, logical and semantic framework, model-based software engineering, real-time and probabilistic extensions, verification techniques, and distributed systems."
Berlin: Springer, 2012
e20407300
eBooks  Universitas Indonesia Library
cover
Julia Kotlarsky, editor
"This book contains 13 carefully revised and selected papers from the 6th Workshop on Global Sourcing, held in Courchevel, France, during March 12-15, 2012. They have been selected from 46 submissions and represent both client and supplier perspectives on sourcing of global services. The topics discussed combine theoretical and practical insights, and they are extensively illustrated by case studies from client and vendor organizations. Last but not least, the book examines current and future trends in outsourcing and offshoring, paying particular attention to the centrality of innovation in sourcing arragements, and how innovation can be realized in outsourcing."
Berlin: [, Springer-Verlag], 2012
e20408542
eBooks  Universitas Indonesia Library
cover
Ari Juels, editor
"This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID."
Berlin: Springer-Verlag, 2012
e20407984
eBooks  Universitas Indonesia Library
cover
Yun Qing Shi, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Workshop on Digital-forensics and Watermarking (IWDW 2011) held in Atlantic City, NJ, USA, during October 23-26, 2011. The 37 revised full papers presented were carefully selected from 59 submissions. Conference papers are organized in 6 technical sessions, covering the topics of steganography and steganalysis, watermarking, visual cryptography, forensics, anti-forensics, fingerprinting, privacy and security."
Berlin: [, Springer-Verlag ], 2012
e20410075
eBooks  Universitas Indonesia Library
cover
"This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects of ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies."
Berlin: Springer-Verlag, 2012
e20409541
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>