Computational Science and Its Applications - ICCSA 2005Part II
Title | Computational Science and Its Applications - ICCSA 2005Part II PDF eBook |
Author | Osvaldo Gervasi |
Publisher | Springer Science & Business Media |
Pages | 1380 |
Release | 2005-04-27 |
Genre | Computers |
ISBN | 3540258612 |
The four-volume set LNCS 3480-3483 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2005, held in Singapore in May 2005. The four volumes present a total of 540 papers selected from around 2700 submissions. The papers span the whole range of computational science, comprising advanced applications in virtually all sciences making use of computational techniques as well as foundations, techniques, and methodologies from computer science and mathematics, such as high performance computing and communication, networking, optimization, information systems and technologies, scientific visualization, graphics, image processing, data analysis, simulation and modelling, software systems, algorithms, security, multimedia etc.
Computational Science and Its Applications
Title | Computational Science and Its Applications PDF eBook |
Author | |
Publisher | |
Pages | 1420 |
Release | 2003 |
Genre | Computational complexity |
ISBN |
Pervasive Computing
Title | Pervasive Computing PDF eBook |
Author | |
Publisher | |
Pages | 386 |
Release | 2005 |
Genre | Embedded computer systems |
ISBN |
Detection of Intrusions and Malware, and Vulnerability Assessment
Title | Detection of Intrusions and Malware, and Vulnerability Assessment PDF eBook |
Author | Klaus Julisch |
Publisher | Springer Science & Business Media |
Pages | 252 |
Release | 2005-06-24 |
Genre | Business & Economics |
ISBN | 3540266135 |
This book constitutes the refereed proceedings of the second International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2005, held in Vienna, Austria, in July 2005. The 14 revised full papers presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on obfuscated code detection, honeypots, vulnerability assessment and exploit analysis, anomaly detection, misuse detection, and distributed intrusion detection and IDS testing.
Mobile Computing: Concepts, Methodologies, Tools, and Applications
Title | Mobile Computing: Concepts, Methodologies, Tools, and Applications PDF eBook |
Author | Taniar, David |
Publisher | IGI Global |
Pages | 3721 |
Release | 2008-11-30 |
Genre | Computers |
ISBN | 9781605660547 |
"This multiple-volume publication advances the emergent field of mobile computing offering research on approaches, observations and models pertaining to mobile devices and wireless communications from over 400 leading researchers"--Provided by publisher.
Trust Management
Title | Trust Management PDF eBook |
Author | |
Publisher | |
Pages | 452 |
Release | 2005 |
Genre | Computer systems |
ISBN |
The Semantic Web: Research and Applications
Title | The Semantic Web: Research and Applications PDF eBook |
Author | |
Publisher | |
Pages | 768 |
Release | 2005 |
Genre | Knowledge management |
ISBN |