The study of the genetic basis for evolution has flourished in this century, as well as our understanding of the evolvability and programmability of biological systems.
This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them.
SmartShadow: Models and Methods for Pervasive Computing offers a new perspective on pervasive computing with SmartShadow, which is designed to model a user as a personality "e;shadow"e; and to model pervasive computing environments as user-centric dynamic virtual personal spaces.
This book is a collection of refereed invited papers on the history of computing from the 1940s to the 1990s with one paper going back to look at Italian calculating/computing machines from the first century to the 20th century.
Whether ERP software, office applications, open-source products or online games: In terms of its economic characteristics, software differs fundamentally from industrial goods or services.
Python Fast Track: A Complete Guide to Rapidly Mastering and Applying Python Programming adopts a simplified writing style and provides clear explanations to ensure ease of understanding, making it an ideal resource for those new to Python.
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols.
Das Buch verhilft Lesern dazu, das eigene Netz mit den Augen des Angreifers zu sehen – um seine Techniken zu verstehen und um sich besser schützen zu können.
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers.
Born after World War II, large-scale experimental high-energy physics (HEP) has found itself limited ever since by available accelerator, detector and computing technologies.
"e;UNIX Operating System: The Development Tutorial via UNIX Kernel Services"e; introduces the hierarchical structure, principles, applications, kernel, shells, development, and management of the UNIX operation systems multi-dimensionally and systematically.
The term evolutionary computing refers to the study of the foundations and applications of certain heuristic techniques based on the principles of natural evolution; thus the aim of designing evolutionary algorithms (EAs) is to mimic some of the processes taking place in natural evolution.
Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing.
The rapid advances in performance and miniaturisation in microtechnology are constantly opening up new markets for the programmable logic controller (PLC).
Until recently B-spline curves and surfaces (NURBS) were principally of interest to the computer aided design community, where they have become the standard for curve and surface description.
The origin ofPASRO (Trademark ofBIOMATIK GmbH, Freiburg, FRG) was a set of pro- cedures for performing arithmetic on geometric data types and for coordinate transforma- tion for study and teaching purposes, developed as a base for high level robot programming.