Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Computer Vision – ECCV 2024
  • Language: en
  • Pages: 577

Computer Vision – ECCV 2024

None

Computer Vision – ECCV 2024
  • Language: en
  • Pages: 576

Computer Vision – ECCV 2024

None

USPTO Image File Wrapper Petition Decisions 0424
  • Language: en
  • Pages: 1000

USPTO Image File Wrapper Petition Decisions 0424

  • Type: Book
  • -
  • Published: Unknown
  • -
  • Publisher: USPTO

None

Proceedings
  • Language: en
  • Pages: 746

Proceedings

  • Type: Book
  • -
  • Published: 2002
  • -
  • Publisher: Unknown

None

Sovereignty in China
  • Language: en
  • Pages: 301

Sovereignty in China

  • Categories: Law

This book provides a comprehensive history of the emergence and the formation of the concept of sovereignty in China from the year 1840 to the present. It contributes to broadening the history of modern China by looking at the way the notion of sovereignty was gradually articulated by key Chinese intellectuals, diplomats and political figures in the unfolding of the history of international law in China, rehabilitates Chinese agency, and shows how China challenged Western Eurocentric assumptions about the progress of international law. It puts the history of international law in a global perspective, interrogating the widely-held belief of international law as universal order and exploring the ways in which its history is closely anchored to a European experience that fails to take into account how the encounter with other non-European realities has influenced its formation.

Networking And Mobile Computing
  • Language: en
  • Pages: 1321

Networking And Mobile Computing

Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are currently witnessing a proliferation in mobile/wireless technologies and applications. However, these new technologies have ushered in unprecedented challenges for the research community across the range of networking, mobile computing, network security and wireless web applications, and optical network topics. ICCNMC 2005 was sponsored by the China Computer Federation, in cooperation with the Institute for Electrical and Electronics Engineers (IEEE) Computer Society. The objective of this conference was to address and capture highly innovative and stateof-the-art resear...

Information Security and Cryptology - ICISC 2002
  • Language: en
  • Pages: 551

Information Security and Cryptology - ICISC 2002

  • Type: Book
  • -
  • Published: 2003-07-01
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.

High Performance Computing - HiPC 2004
  • Language: en
  • Pages: 553

High Performance Computing - HiPC 2004

  • Type: Book
  • -
  • Published: 2004-12-06
  • -
  • Publisher: Springer

Annotation. This book constitutes the refereed proceedings of the 11th International Conference on High-Performance Computing, HiPC 2004, held in Bangalore, India in December 2004. The 48 revised full papers presented were carefully reviewed and selected from 253 submissions. The papers are organized in topical sections on wireless network management, compilers and runtime systems, high performance scientific applications, peer-to-peer and storage systems, high performance processors and routers, grids and storage systems, energy-aware and high-performance networking, and distributed algorithms.

Information and Communications Security
  • Language: en
  • Pages: 427

Information and Communications Security

This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, and authenticated encryption schemes.

Information Networking
  • Language: en
  • Pages: 952

Information Networking

This book constitutes the refereed proceedings of the International Conference on Information Networking, ICOIN 2005 held in Jeju Island, Korea in January/February 2005. The conference focused on convergence in broadband and mobile networking. The 96 revised full papers presented were carefully reviewed and selected from 427 submissions. The papers are organized in topical sections on wireless LAN, security, TCP and congestion control, wireless ad-hoc network routing, network measurement, routing, power control in wireless networks, quality of service, high speed networks, wireless ad-hoc networks, network design, peer-to-peer networks, and applications and services.