You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004. The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on encrypted data access, privacy perserving data management, access control, and database security.
The Sixth International Financial Cryptography Conference was held during March 11-14, 2002, in Southampton, Bermuda. As is customary at FC, these proceedings represent "final" versions of the papers presented, revised to take into account comments and discussions from the conference. Submissions to the conference were strong, with 74 papers submitted and 19 accepted for presentation and publication. (Regrettably, three of the submit ted papers had to be summarily rejected after it was discovered that they had been improperly submitted in parallel to other conferences.) The small program committee worked very hard under a tight schedule (working through Christmas day) to select the program. ...
The algorithms involve using techniques from computer science and mathematics to solve combinatorial problems whose associated data require the use of a hierarchy of storage devices. The 15 papers discuss such topics as synopsis data structures for massive data sets, maximum clique problems in very large graphs, concrete software libraries, computing on data streams, efficient cross-trees for external memory, efficient schemes for distributing data on parallel memory systems, and external memory techniques for iso-surface extraction in scientific visualization. Annotation copyrighted by Book News, Inc., Portland, OR.
This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Security Protocols, held in Cambridge, UK, in April 2002. The 16 revised full papers presented together with transcriptions of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Also included are abstracts and summaries of an introduction and a keynote, as well as a concluding discussion and statement. Among the topics addressed are authentication, mobile ad-hoc network security, secure distributed document processing, access control, confidentiality, protocol attacks, delegation, certified transfer servers, intrusion tolerance, multi-party communication protocols, IPv6 security, and others.
This book constitutes the refereed proceedings of the 16th International Conference on Distributed Computing, DISC 2002, held in Toulouse, France, in October 2002. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. Among the issues addressed are broadcasting, secure computation, view maintenance, communication protocols, distributed agreement, self-stabilizing algorithms, message-passing systems, dynamic networks, condition monitoring systems, shared memory computing, Byzantine processes, routing, failure detection, compare-and-swap operations, cooperative computation, and consensus algorithms.
This volume stems from two DIMACS activities, the U.S.-Africa Advanced Study Institute and the DIMACS Workshop, both on Mathematical Modeling of Infectious Diseases in Africa, held in South Africa in the summer of 2007. It contains both tutorial papers and research papers. Students and researchers should find the papers on modeling and analyzing certain diseases currently affecting Africa very informative. In particular, they can learn basic principles of disease modeling and stability from the tutorial papers where continuous and discrete time models, optimal control, and stochastic features are introduced.
Papers from an October 1997 workshop survey major topics in modern applications of networks in the context of distributed computing. Articles touch on fundamental problems and challenges related to recent technological advances in the networking industry which are directly relevant and interesting to research on the mathematical principles of distributed computing. Subjects include ATM networking technology, routing and flow control in communications networks, security, optical networking, and mobile computing. No index. Annotation copyrighted by Book News, Inc., Portland, OR.
Comprising the proceedings of a June 1997 DIMACS workshop held in Princeton, New Jersey, the 11 articles in this volume survey emerging topics in discrete probability including Markov chains, random trees, distributional estimates, and Poisson processes, and reconstructing random walk from scenery. Lacks an index. Annotation copyrighted by Book News, Inc., Portland, OR.
This volume presents the proceedings from the Mid-Atlantic Mathematical Logic Seminar (MAMLS) conference held in honor of Andras Hajnal at the DIMACS Center, Rutgers University (New Brunswick, NJ). Articles include both surveys and high-level research papers written by internationally recognized experts in the field of set theory. Many of the current active areas of set theory are represented in this volume. It includes research papers on combinatorial set theory, set theoretictopology, descriptive set theory, and set theoretic algebra. There are valuable surveys on combinatorial set theory, fragments of the proper forcing axiom, and the reflection properties of stationary sets. The book also includes an exposition of the ergodic theory of lattices in higher rank semisimpleLie groups-essential reading for anyone who wishes to understand much of the recent work on countable Borel equivalence relations.
A response to the exhaustion of fiber-optic cable network capacity for digital telecommunication and the resulting shift from time-division multiplexing (TDM) to wavelength-division multiplexing (WDM) to add capacity, and the rapid sales of the new technology. Theorists and practitioners in computer science present 17 papers applying theoretical and algorithmic results to such practical problems as admissions control, routing and channel assignments, multicasting and protection, and fault-tolerance. No index. Annotation copyrighted by Book News, Inc., Portland, OR.