You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Analysis of Structures on Elastic Foundations is a practical guide for structural and geotechnical engineers as well as graduate students working in foundation engineering. Included are detailed descriptions of practical methods of analysis of various foundations including simple beams on elastic foundations as well as very complex foundations such as mat foundations supported on piles. Methods for fast and easy hand analysis in addition to methods for exact computer analysis are presented. Most of the methods are developed for three soil models: Winkler foundation, elastic half-spaces, and elastic layers. Numerous numerical examples illustrate the applications of these methods.
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011. The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presen...
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.
The growth of the Internet and the availability of powerful computers and hi- speed networks as low-cost commodity components are changing the way we do computing. These new technologies have enabled the clustering of a wide variety of geographically distributed resources, such as supercomputers, storage systems, data sources, and special devices and services, which can then be used as a uni?ed resource. Furthermore, they have enabled seamless access to and interaction among these distributed resources, services, applications, and data. The new paradigm that has evolved is popularly termed “Grid computing”. Grid computing and the utilization of the global Grid infrastructure have present...
The two volume set, CCIS 262 and 263, constitutes the refereed proceedings of the International Conference, MulGraB 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of multimedia, computer graphics and broadcasting.
Conventional computational methods, and even the latest soft computing paradigms, often fall short in their ability to offer solutions to many real-world problems due to uncertainty, imprecision, and circumstantial data. Hybrid intelligent computing is a paradigm that addresses these issues to a considerable extent. The Handbook of Research on Advanced Hybrid Intelligent Techniques and Applications highlights the latest research on various issues relating to the hybridization of artificial intelligence, practical applications, and best methods for implementation. Focusing on key interdisciplinary computational intelligence research dealing with soft computing techniques, pattern mining, data analysis, and computer vision, this book is relevant to the research needs of academics, IT specialists, and graduate-level students.
This book constitutes the refereed proceedings of the 14th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2022, held Ho Chi Minh City, Vietnam in November 2022. The 113 full papers accepted for publication in these proceedings were carefully reviewed and selected from 406 submissions. The papers of the 2 volume-set are organized in the following topical sections: data mining and machine learning methods, advanced data mining techniques and applications, intelligent and contextual systems, natural language processing, network systems and applications, computational imaging and vision, decision support and control systems, and data modeling and processing for industry 4.0. The accepted and presented papers focus on new trends and challenges facing the intelligent information and database systems community.
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.
This book constitutes the refereed proceedings of the First International Conference on Cryptology hosted in Malaysia, held in Kuala Lumpur, Malaysia in September 2005, in conjunction with the e-Secure Malaysia 2005 convention. The 19 revised full papers presented together with 3 invited papers were carefully reviewed and selected from a total of 90 submissions. The papers are organized in topical sections on stream ciphers analysis, cryptography based on combinatorics, cryptographic protocols, implementation issues, unconventional cryptography, block cipher cryptanalysis, and homomorphic encryption.