Mathematicians do not study objects, but relations among objectsj they are indifferent to the replacement of objects by others as long as relations do not change. Matter is not important, only form interests them. HEN...
详细信息
ISBN:
(数字)9783662040539
Mathematicians do not study objects, but relations among objectsj they are indifferent to the replacement of objects by others as long as relations do not change. Matter is not important, only form interests them. HENRI POINCARE (1854-1912) Computer scientists working on algorithms for factorization would be well advised to brush up on their number theory. IAN STEWART [219] The theory of numbers, in mathematics, is primarily the theory of the prop erties of integers (i.e., the whole numbers), particularly the positive integers. For example, Euclid proved 2000 years aga in his Elements that there exist infinitely many prime numbers. The subject has long been considered as the purest branch of mathematics, with very few applications to other areas. How ever, recent years have seen considerable increase in interest in several central topics of number theory, precisely because of their importance and applica tions in other areas, particularly in computing and information technology.
This book brings feminist philosophy, in the shape of feminist ethics, politics and legal theory, to an analysis of computer ethics problems including hacking, privacy, surveillance, cyberstalking and Internet dating....
详细信息
ISBN:
(数字)9780230000520
ISBN:
(纸本)9781403915061;9781349512096
This book brings feminist philosophy, in the shape of feminist ethics, politics and legal theory, to an analysis of computer ethics problems including hacking, privacy, surveillance, cyberstalking and Internet dating. Adam claims that these issues cannot be properly understood unless we see them as problems relating to gender. For the first time, these issues are put under the feminist spotlight to show that traditional responses reproduce the public/private split which has so often reinforced the causes of women's oppression.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 rev...
详细信息
ISBN:
(数字)9783642014406
ISBN:
(纸本)9783642014390
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on digital signature and signcryption schemes, privacy and anonymity, message authentication code and hash function, secure protocols, symmetric cryptography, certificateless cryptography, hardware implementation and side channel attack, wireless network security, public key and identity based cryptography, access control and network security, as well as trusted computing and applications.
ADO (Active Data Objects) is how the millions of Visual Basic programmers hitch onto Microsoft's amazing "Universal Database Access" strategy. But power breeds complexity, and using ADO isn't trivial...
详细信息
ISBN:
(数字)9781430211563
ADO (Active Data Objects) is how the millions of Visual Basic programmers hitch onto Microsoft's amazing "Universal Database Access" strategy. But power breeds complexity, and using ADO isn't trivial! This book is based on best-selling author Bill Vaughn's years of experience working with front-line data access developers and the development teams at Microsoft itself. Now, this Microsoft veteran translates his insights and collected wisdom of over a decade at Microsoft into working solutions for the common (and some not so common) data-related problems developers face every day.;focuses on addressing data problems at the root - through better designs and better ADO coding practices. These suggestions often yield far better performance - both for the developer (who is able to write better code more quickly), and for the application (it runs faster with less resources).;William R. Vaughn is currently a Developer Trainer at Microsoft. He has taught, written, lectured, sold, supported, designed, coded, managed and cried over mainframe and microcomputer systems and software for 28 years. He has been at Microsoft since 1986 and has held positions ranging from writing, teaching and managing trainers at the Microsoft University (MSU) to being Visual Basic Enterprise Product Manager. During his last two years at Microsoft he has been with the Internal Technical Education group teaching Microsoft employees themselves. While there he developed and taught courses on Visual Basic, data architectures, and ActiveX Data Objects (ADO).
Every thought is a throw of dice. Stephane Mallarme This book is the last one of a trilogy which reports a part of our research work over nearly thirty years (we discard our non-conventional results in automatic contr...
详细信息
ISBN:
(数字)9789401594967
ISBN:
(纸本)9780792363309;9789048154678
Every thought is a throw of dice. Stephane Mallarme This book is the last one of a trilogy which reports a part of our research work over nearly thirty years (we discard our non-conventional results in automatic control theory and applications on the one hand, and fuzzy sets on the other), and its main key words are informationtheory, Entropy, Maximum Entropy Principle, Linguistics, Thermodynamics, Quantum Mechanics, Fractals, Fractional Brownian Motion, Stochastic Differential Equations of Order n, Stochastic Optimal Control, Computer Vision. Our obsession has been always the same: Shannon's informationtheory should play a basic role in the foundations of sciences, but subject to the condition that it be suitably generalized to allow us to deal with problems which are not necessarily related to communication engineering. With this objective in mind, two questions are of utmost importance: (i) How can we introduce meaning or significance of information in Shannon's informationtheory? (ii) How can we define and/or measure the amount of information involved in a form or a pattern without using a probabilistic scheme? It is obligatory to find suitable answers to these problems if we want to apply Shannon's theory to science with some chance of success. For instance, its use in biology has been very disappointing, for the very reason that the meaning of information is there of basic importance, and is not involved in this approach.
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.;The 61 full papers and 40 sh...
详细信息
ISBN:
(数字)9783030373528
ISBN:
(纸本)9783030373511
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019.;The 61 full papers and 40 short papers presented were carefully reviewed and selected from 235 submissions. The papers cover a broad range of topics in the field of cyberspace safety and security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. They are organized in the following topical sections: network security; system security; information security; privacy preservation; machine learning and security; cyberspace safety; big data and security; and cloud and security;
暂无评论