You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Bimetallic nanoparticles, also called nanoalloys, are at the heart of nanoscience because of their ability to tune together composition and size for specific purposes. By approaching both their physical and chemical properties, Nanoalloys: Synthesis, Structure & Properties provides a comprehensive reference to this research field in nanoscience by addressing the subject from both experimental and theoretical points of view, providing chapters across three main topics: Growth and structural properties Thermodynamics and electronic structure of nanoalloys Magnetic, optic and catalytic properties The growth and elaboration processes which are the necessary and crucial part of any experimental a...
None
This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and published in 1967. This book contains 35 talks dealing with cryptography as a whole. They are organized in topical section named: history; technology – past, present, future; efficient cryptographic implementations; treachery and perfidy; information security; cryptanalysis; side-channel attacks; randomness embedded system security; public-key cryptography; and models and protocols.
This book undertakes a thorough study of Reindeer in the Upper Pleniglacial and Tardiglacial societies in France. It addresses two main topics – the economy of animal resources within the societies and the exploitation of Reindeer organized within the annual cycle, in terms of space and time, between 30,000 and 14,000 cal BP in France. The author proposes an analysis and hypothesis regarding the economy of animal resources and the nomadic cycle of the last Paleolithic hunter-gatherer societies, in order to identify a “Reindeer system.” The author discusses the relationship between Reindeer and human mobility and offers some conclusions regarding the annual cycles of nomadism. The volume scrutinizes the distinct eco systems in three regions and its effects on the movements of both human and animal. This book is of interest to zooarchaeologists and prehistorians.
How did a man born enslaved on a plantation triumph over Napoleon’s invading troops and become king of the first free black nation in the Americas? This is the forgotten, remarkable story of Henry Christophe. Christophe fought as a child soldier in the American War of Independence, before serving in the Haitian Revolution as one of Toussaint Louverture’s top generals. Following Haitian independence, Christophe crowned himself King Henry I. His attempts to build a modern black state won the support of leading British abolitionists—but his ambition helped to plunge his country into civil war. Christophe saw himself as an Enlightenment ruler, and his kingdom produced great literary works, epic fortresses and opulent palaces. He was a proud anti-imperialist and fought off French plots against him. Yet the Haitian people chafed under his authoritarian rule. Today, all that remains is Christophe’s mountaintop Citadelle, Haiti’s sole World Heritage site—a monument to a revolutionary black monarchy, in a world of empire and slavery.
This book will be published Open Access with a Creative Commons Attribution 4.0 International License (CC BY 4.0). The eBook can be downloaded electronically for free. This volume contains the proceedings of the LuCaNT (LMFDB, Computation, and Number Theory) conference held from July 10–14, 2023, at the Institute for Computational and Experimental Research in Mathematics (ICERM), Providence, Rhode Island and affiliated with Brown University. This conference provided an opportunity for researchers, scholars, and practitioners to exchange ideas, share advances, and collaborate in the fields of computation, mathematical databases, number theory, and arithmetic geometry. The papers that appear in this volume record recent advances in these areas, with special focus on the LMFDB (the L-Functions and Modular Forms Database), an online resource for mathematical objects arising in the Langlands program and the connections between them.
None
These proceedings collect several number theory articles, most of which were written in connection to the workshop WIN4: Women in Numbers, held in August 2017, at the Banff International Research Station (BIRS) in Banff, Alberta, Canada. It collects papers disseminating research outcomes from collaborations initiated during the workshop as well as other original research contributions involving participants of the WIN workshops. The workshop and this volume are part of the WIN network, aimed at highlighting the research of women and gender minorities in number theory as well as increasing their participation and boosting their potential collaborations in number theory and related fields.
This book contains revised selected papers from the 27th International Conference on Selected Areas in Cryptography, SAC 2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27 full papers presented in this volume were carefully reviewed and selected from 52 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions
The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.