PC-Spieler rusten ihre Computer mit Grafikkarten im Wert von Tausenden Euro auf, nur um festzustellen, dass das teuerste neue Spiel beim Betreten eines neuen Raumes plotzlich in ein unspielbares, ruckelndes Standbild verfallt.
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result.
This book is thematically positioned at the intersections of Urban Design, Architecture, Civil Engineering and Computer Science, and it has the goal to provide specialists coming from respective fields a multi-angle overview of state-of-the-art work currently being carried out.
The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds.
Für die Printmedienunternehmen haben sich durch das Internet neue Geschäftsfelder eröffnet: Informationen werden sowohl für die Papier- als auch für die Onlineausgabe aufbereitet.
"e;Constructive Computation in Stochastic Models with Applications: The RG-Factorizations"e; provides a unified, constructive and algorithmic framework for numerical computation of many practical stochastic systems.
Coloured Petri Nets (CPN) is a graphical language for modelling and validating concurrent and distributed systems, and other systems in which concurrency plays a major role.
Collected articles in this series are dedicated to the development and use of software for earth system modelling and aims at bridging the gap between IT solutions and climate science.
This book is devoted to the most difficult part of concurrent programming, namely synchronization concepts, techniques and principles when the cooperating entities are asynchronous, communicate through a shared memory, and may experience failures.
Field-Programmable Gate Arrays (FPGAs) are revolutionizing digital signal processing as novel FPGA families are replacing ASICs and PDSPs for front-end digital signal processing algorithms.
In today's world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This book constitutes the refereed proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms, Middleware 2001, held in Heidelberg, Germany, in November 2001.
On behalf of the program committee, it is our pleasure to present to you the proceedings of the fourth Recent Advances in Intrusion Detection Symposium.
In very short time, peer-to-peer computing has evolved from an attractive new paradigm into an exciting and vibrant research field bringing together researchers from systems, networking, and theory.
Adaptive Agents and Multi-Agent Systems is an emerging and exciting interdisciplinary area of research and development involving artificial intelligence, computer science, software engineering, and developmental biology, as well as cognitive and social science.