You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Over the years, this book has become a standard reference and guide in the set theory community. It provides a comprehensive account of the theory of large cardinals from its beginnings and some of the direct outgrowths leading to the frontiers of contemporary research, with open questions and speculations throughout.
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.
This book constitutes the refereed proceedings of the 10th International Conference on Principles of Distributed Systems, OPODIS 2006, held at Bordeaux, France, in December 2006. The 28 revised full papers presented together with 2 invited talks were carefully reviewed and selected from more than 230 submissions. The papers address all current issues in theory, specification, design and implementation of distributed and embedded systems.
This book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018. The 16 full papers, 1 short paper, 1 position paper and 2 invited papers presented in this book, were carefully reviewed and selected from 51 submissions. They cover a range of topics including mobile security; cloud security and big data; IoT security; software security, malware analysis, and vulnerability detection; cryptography; cyber physical security and hardware security; and access control.
Wireless ad hoc sensor networks has recently become a very active research subject. Achieving efficient, fault-tolerant realizations of very large, highly dynamic, complex, unconventional networks is a real challenge for abstract modelling, algorithmic design and analysis, but a solid foundational and theoretical background seems to be lacking. This book presents high-quality contributions by leading experts worldwide on the key algorithmic and complexity-theoretic aspects of wireless sensor networks. The intended audience includes researchers and graduate students working on sensor networks, and the broader areas of wireless networking and distributed computing, as well as practitioners in the relevant application areas. The book can also serve as a text for advanced courses and seminars.
The ultimate goal of research in Distributed Computing is to understand the nature, properties and limits of computing in a system of autonomous communicating agents. To this end, it is crucial to identify those factors which are significant for the computability and the communication complexity of problems. A crucial role is played by those factors which can be termed Structural Information: its identification, characterization, analysis, and its impact on communication complexity is an important theoretical task which has immediate practical importance. The purpose of the Colloquia on Structural Information and Communication Complexity (SIROCCO) is to focus explicitly on the interaction between structural information and communication complexity. The Colloquia comprise position papers, presentations of current research, and group discussions. Series 1 contains papers presented at the 1st Colloquium on Structural Information and Communication Complexity, held in Ottawa, Canada. Series 2 contains papers presented at the 2nd Colloquium held in Olympia, Greece.
This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2004, held in Malaga, Spain in October 2004. The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.
Here are the refereed proceedings of the 5th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2006, held in Ottawa, Canada, August 2006. The book presents 25 revised full papers and 10 revised short papers together with abstracts of 2 invited talks, in sections on routing in sensor networks, Routing in MANET, short papers on routing, security, wireless MAC, short papers on security, QoS and TCP, and upper layer issues.
Nonlinear Labor Market Dynamics discusses adjustment processes in labor markets. Contrary to linear-stochastic approaches this book is based on a non-linear deterministic framework. It is shown that even textbook-like-models of the labor market can generate long lasting adjustment processes, local instabilities, and chaotic movements, once nonlinear relationships and widely accepted adjustment rules are introduced. Thus, labor market dynamics may have an endogenous component that is governed by a nonlinear deterministic core. Of course, all results are tied to the particular models discussed in this book. Nevertheless, these models imply that by incorporating nonlinear relationships, one may arrive at an explanation of labor market behavior where linear stochastic approaches fell. Time series studies for German labor market data support this point of view.
This book constitutes the refereed proceedings of the 4th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2005, held in Cancun, Mexico in October 2005. The 27 revised full papers presented together with the abstracts of 2 invited talks were carefully reviewed and selected from over 100 submissions. The papers discuss architectures, protocols, and algorithms for: access control, scheduling, ad hoc and sensor networks analytic methods and modelling for performance evaluation, characterization, optimization, auto-configuration, incentives and pricing, location awareness, discovery, dependence, and management, mesh networks, new applications, power management, power control, and energy-efficiency, quality-of-service, resource allocation, multimedia, routing (unicast, multicast, etc.), security and privacy, service discovery, systems and testbeds, wireless internet, and data management.