You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This two-volume set of CCIS 391 and CCIS 392 constitutes the refereed proceedings of the Fourth International Conference on Information Computing and Applications, ICICA 2013, held in Singapore, in August 2013. The 126 revised full papers presented in both volumes were carefully reviewed and selected from 665 submissions. The papers are organized in topical sections on Internet computing and applications; engineering management and applications; Intelligent computing and applications; business intelligence and applications; knowledge management and applications; information management system; computational statistics and applications.
This book constitutes the refereed proceedings of the First International Conference on Applied Cryptography and Network Security, ACNS 2003, held in Kunming, China, in October 2003. The 32 revised full papers presented were carefully reviewed and selected from a total of 191 submissions. The papers are organized in topical sections on cryptographic applications, intrusion detection, cryptographic algorithms, digital signatures, security modeling, Web security, security protocols, cryptanalysis, key management, and efficient implementations.
LEGENDARY FRONTIER CHAPTER 11 Stepping onto the suspension bridge, Yan Fei stopped in shock, the scene before his eyes was completely beyond his expectations. He thought it was a temple with many towers, but now it seemed to have turned into a land after experiencing a disaster, with only broken tiled walls and charcoal left. But at the end of the desolate land here, on a large laterite slab, a strange square house was built, about two zhang high and wide, standing alone, becoming the only building in the temple that was lucky enough to still exist. The entire temple was built against a natural cliff, the crescent-shaped backyard was a steep cliff that was tens of thousands of zhang deep. From where Yan Fei looked, the space around the strange stone building seemed to be floating and mysterious, he could only click his tongue and sigh, only by seeing it with his own eyes could he believe it. Yan Fei felt suffocated, secretly thinking that this place could be compared to any of the four beautiful scenes of the Borderland, if he had the chance, he would definitely bring Tian Tian to see it.
This book constitutes the refereed proceedings of the 5th International Conference on Information and Communication Security, ICICS 2003, held in Huhehaote, China, in October 2003. The 37 revised full papers presented were carefully reviewed and selected from 176 submissions. The papers address a broad variety of topics in information and communications security including finite field computations, digital signature schemes, mobile agents security, access control, cryptographic attacks, public key cryptography, peer-to-peer security, watermarking, broadcast encryption, information hiding, cryptographic protocols, oblivious transfer, fingerprinting schemes, security verification, TCP/IP security, support vector machine, intrusion detection, and authenticated encryption schemes.
The 12th volume of Reports on Industrial Information Technology presents some selected results of research achieved at the Institute of Industrial Information Technology during the last two years.These results have contributed to many cooperative projects with partners from academia and industry and cover current research interests including signal and image processing, pattern recognition, distributed systems, powerline communications, automotive applications, and robotics.
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023. The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows: Part I: Crypto. Part II: Network, web and internet; privacy; and remote. Part III: Attacks; blockchain; and miscellaneous. Part IV: Machine learning; software and systems security.
This book presents the proceedings of the 17th Chinese Intelligent Systems Conference, held in Fuzhou, China, on Oct 16-17, 2021. It focuses on new theoretical results and techniques in the field of intelligent systems and control. This is achieved by providing in-depth study on a number of major topics such as Multi-Agent Systems, Complex Networks, Intelligent Robots, Complex System Theory and Swarm Behavior, Event-Triggered Control and Data-Driven Control, Robust and Adaptive Control, Big Data and Brain Science, Process Control, Intelligent Sensor and Detection Technology, Deep learning and Learning Control Guidance, Navigation and Control of Flight Vehicles and so on. The book is particularly suited for readers who are interested in learning intelligent system and control and artificial intelligence. The book can benefit researchers, engineers, and graduate students.
This two-volume set represents a collection of papers presented at the 18th International Conference on Environmental Degradation of Materials in Nuclear Power Systems – Water Reactors. The purpose of this conference series is to foster an exchange of ideas about problems and their remedies in water-cooled nuclear power plants of today and the future. Contributions cover problems facing nickel-based alloys, stainless steels, pressure vessel and piping steels, zirconium alloys, and other alloys in water environments of relevance. Components covered include pressure boundary components, reactor vessels and internals, steam generators, fuel cladding, irradiated components, fuel storage containers, and balance of plant components and systems.
Conference proceedings covering the latest technology developments for fossil fuel power plants, including nickel-based alloys for advanced ultrasupercritical power plants, materials for turbines, oxidation and corrosion, welding and weld performance, new alloys concepts, and creep and general topics.
LEGENDARY FRONTIER CHAPTER 14 Yan Fei glided quickly through the wilderness. Feeling relaxed and excited, he headed straight towards Huai Shui. He felt that Sun En was chasing him ten miles behind, a very specific feeling, not vague, it was clearer than any situation that had ever happened before. Die Luyen Hoa in the fire field called out to warn his master, like the night bells awakening a part of Yan Fei's spiritual sense, causing him to take a big step towards the "Immortal World". Great Law of the Sun and Moon Le Thien circulating within his body was a method of cultivating his own cultivation that he had created, which had gone from complicated to simple. The secret was the Thoi Am Phu...