You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security and authentication.
This tutorial offers readers a thorough introduction to programming in Python 2.4, the portable, interpreted, object-oriented programming language that combines power with clear syntax Beginning programmers will quickly learn to develop robust, reliable, and reusable Python applications for Web development, scientific applications, and system tasks for users or administrators Discusses the basics of installing Python as well as the new features of Python release 2.4, which make it easier for users to create scientific and Web applications Features examples of various operating systems throughout the book, including Linux, Mac OS X/BSD, and Windows XP
Concise and easy to use, this handy pocket guide to XP is a must-have quick reference for anyone implementing a test-driven development environment.
This is written for system administrators who may not have the time to learn about Slash by reading the source code. It collects all the current Slash knowledge from the code, Website and mailing lists and organizes it into a coherent package.
Not far in the future the seas have risen and the central latitudes are emptying but it’s still a good time to be rich in San Francisco where weapons drones patrol the skies to keep out the multitudinous poor. Irina isn’t rich, not quite, but she does have an artificial memory that gives her perfect recall, and lets her act as a medium between her various employers and their AIs, which are complex to the point of opacity. It’s a good gig, paying enough for the annual visits to the Mayo Clinic that keep her from ageing. Kern has no such access; he's one of the many refugees in the sprawling drone-built favelas on the city’s periphery, where he lives like a monk, training relentlessly ...
Enemies-to-lovers, fake-date, little-sister’s-best-friend, second-chance, forbidden, stand-alone contemporary romance. Ricky Dunn is the equivalent of a splinter under my fingernail. Romantic? Right. He’s the older brother of my best friend, and no matter how hard either of us tries, we can’t seem to avoid each other. The problem started on the night my best friend and I graduated from high school. The party was joyous, a celebration. That night, I willingly gave Ricky a part of me—more than the kiss we told others about. Our deal was simple. No strings. Ricky kept his side of the bargain. Years have passed. Being from the same small town and crossing paths, I haven’t noticed how h...
Monte-Carlo Tree Search (MCTS) is a class of simulation-based search algorithms. It brought about great success in the past few years regarding the evaluation of deterministic two-player games such as the Asian board game Go. In this thesis, we present a parallelization of the most popular MCTS variant for large HPC compute clusters that efficiently shares a single game tree representation in a distributed memory environment and scales up to 128 compute nodes and 2048 cores. It is hereby one of the most powerful MCTS parallelizations to date. In order to measure the impact of our parallelization on the search quality and remain comparable to the most advanced MCTS implementations to date, we implemented it in a state-of-the-art Go engine Gomorra, making it competitive with the strongest Go programs in the world. We further present an empirical comparison of different Bayesian ranking systems when being used for predicting expert moves for the game of Go and introduce a novel technique for automated detection and analysis of evaluation uncertainties that show up during MCTS searches.
None