This volume includes a selection of papers presented at the second workshop on Robot Kinematics held in Linz, September 10-12, 1990. The papers present new results and overviews on various aspects of robot kinematics such as modelling and computation...Lasīt vairāk
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science a...Lasīt vairāk
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science a...Lasīt vairāk
See a Mesos-based big data stack created and the components used. You will use currently available Apache full and incubating systems. The components are introduced by example and you learn how they work together.In the Complete Guide to Open Source...Lasīt vairāk
See a Mesos-based big data stack created and the components used. You will use currently available Apache full and incubating systems. The components are introduced by example and you learn how they work together.In the Complete Guide to Open Source...Lasīt vairāk
The book focuses on the state-of-the-art technologies pertaining to advances in soft computing, intelligent system and applications. The Proceedings of ASISA 2016 presents novel and original work in soft computing, intelligent system and applications...Lasīt vairāk
The book focuses on the state-of-the-art technologies pertaining to advances in soft computing, intelligent system and applications. The Proceedings of ASISA 2016 presents novel and original work in soft computing, intelligent system and applications...Lasīt vairāk
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art...Lasīt vairāk
This book describes various methods and recent advances in predictive computing and information security. It highlights various predictive application scenarios to discuss these breakthroughs in real-world settings. Further, it addresses state-of-art...Lasīt vairāk
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh ins...Lasīt vairāk
David Forster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems - motivated by the large number of recent security incidents and revelations about mass surveillance...Lasīt vairāk
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or paymen...Lasīt vairāk
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or paymen...Lasīt vairāk
Miguel Heredia Conde aims at finding novel ways to fit the valuable mathematical results of the Compressive Sensing (CS) theory to the specific case of the Photonic Mixer Device (PMD).To this end, methods are presented that take profit of the sparsit...Lasīt vairāk
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomor...Lasīt vairāk
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highli...Lasīt vairāk
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highli...Lasīt vairāk
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and network...Lasīt vairāk
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and network...Lasīt vairāk
Learn the fundamental foundations and concepts of the Apache HBase (NoSQL) open source database. It covers the HBase data model, architecture, schema design, API, and administration.Apache HBase is the database for the Apache Hadoop framework. HBase...Lasīt vairāk