This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes.
Nowadays, online technologies are the core of most fields of engineering and the whole society and are inseparable connected for example with Internet of Things & Industrial Internet of Things (Industry 4.
This book reports on innovations and engineering achievements of industrial relevance, with a special emphasis on industrial engineering developments aimed at improving the quality of processes and products in the context of a sustainable economy.
Contributions from Finn Trosby, Kevin Holley, Ian Harris Written to celebrate the 25th anniversary of SMS standardization by the people who produced the standards, Short Message Service (SMS): The Creation of Personal Text Messaging, describes the development of the SMS standard and its ongoing evolution.
The book is concerned with the concepts of chaos and fractals, which are within the scopes of dynamical systems, geometry, measure theory, topology, and numerical analysis during the last several decades.
A careful analysis of environmental factors is key to understanding the causes of crime, to solving crimes, and eventually helping to predict and prevent them.
This textbook gradually introduces students to the statistical mechanical study of the different phases of matter and to the phase transitions between them.
This textbook describes the theory and methodology of digital forensic examinations, presenting examples developed in collaboration with police authorities to ensure relevance to real-world practice.
This book on computing systems for autonomous driving takes a comprehensive look at the state-of-the-art computing technologies, including computing frameworks, algorithm deployment optimizations, systems runtime optimizations, dataset and benchmarking, simulators, hardware platforms, and smart infrastructures.
This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.
The five-volume set CCIS 2133-2137 constitutes the refereed proceedings of the workshops held in conjunction with the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, during September 18-22, 2023.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
This collection presents contributions on computational fluid dynamics (CFD) modeling and simulation of engineering processes from researchers and engineers involved in the modeling of multiscale and multiphase phenomena in material processing systems.
The book comprises original articles on topical issues of risk theory, rational decision making, statistical decisions, and control of stochastic systems.
A unique, hands-on guide to interactive modeling and simulation of engineering systems This book describes advanced, cutting-edge techniques for dynamic system simulation using the DESIRE modeling/simulation software package.
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019.
The two volume set CCIS 1030 and 1031 constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2018, held in Kalyani, India, in July 2018.
Fully Tuned Radial Basis Function Neural Networks for Flight Control presents the use of the Radial Basis Function (RBF) neural networks for adaptive control of nonlinear systems with emphasis on flight control applications.
This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020.
From past decades, Computational intelligence embraces a number of nature-inspired computational techniques which mainly encompasses fuzzy sets, genetic algorithms, artificial neural networks and hybrid neuro-fuzzy systems to address the computational complexities such as uncertainties, vagueness and stochastic nature of various computational problems practically.
This book presents Internet transport economics as a new approach to understanding the packet-switching paradigm of Internet infrastructure as a global transport system for data packets.
Stability is one of the most studied issues in the theory of time-delay systems, however the corresponding chapters of published volumes on time-delay systems do not include a comprehensive study of a counterpart of classical Lyapunov theory for linear delay free systems.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017.
This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020.
This student mainstay continues to be organised around constitutional themes, with new material on local elections, the politics of the centre and the limits of state power.
This book, the sixth of 15 related monographs, discusses singularity and networks of equilibriums and 1-diemsnional flows in product quadratic and cubic systems.