You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From the Internet to networks of friendship, disease transmission, and even terrorism, the concept--and the reality--of networks has come to pervade modern society. But what exactly is a network? What different types of networks are there? Why are they interesting, and what can they tell us? In recent years, scientists from a range of fields--including mathematics, physics, computer science, sociology, and biology--have been pursuing these questions and building a new "science of networks." This book brings together for the first time a set of seminal articles representing research from across these disciplines. It is an ideal sourcebook for the key research in this fast-growing field. The b...
Managing and Mining Graph Data is a comprehensive survey book in graph management and mining. It contains extensive surveys on a variety of important graph topics such as graph languages, indexing, clustering, data generation, pattern mining, classification, keyword search, pattern matching, and privacy. It also studies a number of domain-specific scenarios such as stream mining, web graphs, social networks, chemical and biological data. The chapters are written by well known researchers in the field, and provide a broad perspective of the area. This is the first comprehensive survey book in the emerging topic of graph data processing. Managing and Mining Graph Data is designed for a varied audience composed of professors, researchers and practitioners in industry. This volume is also suitable as a reference book for advanced-level database students in computer science and engineering.
In the early 1960s, the Alvin Ailey American Dance Theater was a small, multi-racial company of dancers that performed the works of its founding choreographer and other emerging artists. By the late 1960s, the company had become a well-known African American artistic group closely tied to the Civil Rights struggle. In Dancing Revelations, Thomas DeFrantz chronicles the troupe's journey from a small modern dance company to one of the premier institutions of African American culture. He not only charts this rise to national and international renown, but also contextualizes this progress within the civil rights, women's rights, and gay rights struggles of the late 20th century. DeFrantz examine...
This proceedings is designed for computer scientists, engineers and mathematicians interested in the use, design and analysis of algorithms, with special emphasis on questions of efficiency.
This book constitutes the refereed proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science, STACS 99, held in Trier, Germany in March 1999. The 51 revised full papers presented were selected from a total of 146 submissions. Also included are three invited papers. The volume is divided in topical sections on complexity, parallel algorithms, computational geometry, algorithms and data structures, automata and formal languages, verification, algorithmic learning, and logic in computer science.
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For priv...
This book constitutes the refereed proceedings of the 27th International Colloquium on Automata, Languages and Programming, ICALP 2000, held in Geneva, Switzerland in July 2000. The 69 revised full papers presented together with nine invited contributions were carefully reviewed and selected from a total of 196 extended abstracts submitted for the two tracks on algorithms, automata, complexity, and games and on logic, semantics, and programming theory. All in all, the volume presents an unique snapshot of the state-of-the-art in theoretical computer science.
Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was “mobile computing versus immobile security”. As usual, the insights and challenges which emerged during the workshop are re?ected in the position papers, which appear here in rewritten form. Transcripts are also included of the discussions which took place in C- bridge as the initial versions were presented. These transcripts are intended to provide a perspective on lines of argument which are worth pursuing further. Our desire is that you will join with us in this activity, and that as a result you will, like many of our...
Here are the refereed proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006, held in New York City in April 2006. The 34 revised full papers presented are organized in topical sections on cryptanalysis and protocol weaknesses, distributed crypto-computing, encryption methods, cryptographic hash and applications, number theory algorithms, pairing-based cryptography, cryptosystems design and analysis, signature and identification, authentication and key establishment, multi-party computation, and PKI techniques.