The AMAST movement was initiated in 1989 with the First International C- ference on Algebraic Methodology and Software Technology (AMAST), held on May 21{23in Iowa City, Iowa,and aimed at setting the development of software technology on a mathematical basis.
This book presents the refereed proceedings of the International Workshop on Mathematical Methods, Models, and Architectures for Network Security Systems, MMM-ACNS 2001, held in St.
The 1st International Conference on "e;Applied Cryptography and Network Se- rity"e; (ACNS 2003) was sponsored and organized by ICISA (International C- munications and Information Security Association), in cooperation with MiAn Pte.
This book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001.
Since the tragic events of September 11, 2001, academics have been called on for possible contributions to research relating to national (and possibly internat- nal) security.
The aim of this book is to advocate and promote network models of linguistic systems that are both based on thorough mathematical models and substantiated in terms of linguistics.
This book documents the R&D outcome of the PRIME Project, an R&D project partially funded by the European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science.
Crypto '96, the Sixteenth Annual Crypto Conference, is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and P- vacy and the Computer Science Department of the University of California at Santa Barbara (UCSB).
This volume contains the proceedings of the Second International Workshop on Hybrid Systems: Computation and Control (HSCC'99) to be held March 29- 31, 1999, in the village Berg en Dal near Nijmegen, The Netherlands.
In just few years, case-based reasoning has evolved from a research topic studied at a small number of specialized academic labs into an industrial-strength technology applied in various fields.
The four-volume set LNCS constitutes the refereed proceedings of the 9th International Joint Conference on Web and Big Data, APWeb-WAIM 2025, held in Shenyang, China, during August 28–30, 2025.
The four-volume set LNCS constitutes the refereed proceedings of the 9th International Joint Conference on Web and Big Data, APWeb-WAIM 2025, held in Shenyang, China, during August 28–30, 2025.
The four-volume set LNCS constitutes the refereed proceedings of the 9th International Joint Conference on Web and Big Data, APWeb-WAIM 2025, held in Shenyang, China, during August 28–30, 2025.
This book serves as a comprehensive resource for professionals involved in the design, inspection, integrity, maintenance, and operation of hydrogen pipelines, addressing the unique challenges hydrogen presents compared to natural gas or other fuels.
This book serves as a comprehensive resource for professionals involved in the design, inspection, integrity, maintenance, and operation of hydrogen pipelines, addressing the unique challenges hydrogen presents compared to natural gas or other fuels.
Taking you on a voyage of discovery through R and RStudio, this completely updated second edition combines real-world examples and humour with a hands-on 'how to' approach that brings statistics and programming to life.
Taking you on a voyage of discovery through R and RStudio, this completely updated second edition combines real-world examples and humour with a hands-on 'how to' approach that brings statistics and programming to life.
The four-volume set LNCS constitutes the refereed proceedings of the 9th International Joint Conference on Web and Big Data, APWeb-WAIM 2025, held in Shenyang, China, during August 28–30, 2025.
The four-volume set LNCS constitutes the refereed proceedings of the 9th International Joint Conference on Web and Big Data, APWeb-WAIM 2025, held in Shenyang, China, during August 28–30, 2025.
The four-volume set LNCS constitutes the refereed proceedings of the 9th International Joint Conference on Web and Big Data, APWeb-WAIM 2025, held in Shenyang, China, during August 28–30, 2025.
Quantum Cryptography and Annealing for Securing Industrial IoT focuses on the rapidly evolving field of quantum security solutions for Industrial Internet of Things (IIoT) platforms, emphasizing the critical intersection of quantum cryptography, post-quantum cryptography, and their practical applications in IIoT.
Research Methods for Business and Management offers a comprehensive and practical guide to business and management research, combining theoretical foundations with step-by-step, hands-on instruction.
This accessible guide introduces readers to the essential process of collecting, organizing, testing, and interpreting quantitative data in biological anthropology and archaeology.
This accessible guide introduces readers to the essential process of collecting, organizing, testing, and interpreting quantitative data in biological anthropology and archaeology.
Research Methods for Business and Management offers a comprehensive and practical guide to business and management research, combining theoretical foundations with step-by-step, hands-on instruction.
This book offers a comprehensive analysis of the background, practice, potential and challenges associated with developing and using perceptual indicators for assessing sustainability.
This book offers a detailed insight into various business models that can be easily implemented using cutting-edge AI tools like Copilot, ChatGPT, and others.
Decolonising Research examines the effectiveness of Indigenous research methodologies for studying Africa while also examining their effectiveness for generating relevant knowledge and practical research outcomes for community/national problem-solving.
This book offers a comprehensive analysis of the background, practice, potential and challenges associated with developing and using perceptual indicators for assessing sustainability.