Der Autor behandelt den Entwurfsprozess der Gotik unter dem Aspekt von Entwurfs- und Entwicklungsprozessen der Informatik und Ingenieurwissenschaften. Er abstrahiert aus der Klassifikation gotischer Kir...
详细信息
ISBN:
(数字)9783662555187
ISBN:
(纸本)9783662555170
Der Autor behandelt den Entwurfsprozess der Gotik unter dem Aspekt von Entwurfs- und Entwicklungsprozessen der Informatik und Ingenieurwissenschaften. Er abstrahiert aus der Klassifikation gotischer Kirchen den virtuellen Entwurfsprozess der Gotik. Das Buch liefert interessante Einsichten in die Beziehung zwischen der Softwarearchitektur und deren Entwurfsprozess und einem gotischen Entwurf. Die parametrischen Elemente, also die Widerverwendungseinheiten, werden ausführlich erläutert. Die Strukturierung und Verwendung einer Parameter-Bibliothek schließen die Thematik ab.
This book constitutes the proceedings of the 13th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2021, held in Granada, Spain, in September 2021, in conjunction with IFIP WG 8.5 Electroni...
详细信息
ISBN:
(数字)9783030828240
ISBN:
(纸本)9783030828233
This book constitutes the proceedings of the 13th IFIP WG 8.5 International Conference on Electronic Participation, ePart 2021, held in Granada, Spain, in September 2021, in conjunction with IFIP WG 8.5 Electronic Government (EGOV 2021), the Conference for E-Democracy and Open Government Conference (CeDEM 2021).
Link reversal is a versatile algorithm design technique that has been used in numerous distributed algorithms for a variety of problems. The common thread in these algorithms is that the distributed system is viewed a...
详细信息
ISBN:
(数字)9783031020063
ISBN:
(纸本)9783031008788
Link reversal is a versatile algorithm design technique that has been used in numerous distributed algorithms for a variety of problems. The common thread in these algorithms is that the distributed system is viewed as a graph, with vertices representing the computing nodes and edges representing some other feature of the system (for instance, point-to-point communication channels or a conflict relationship). Each algorithm assigns a virtual direction to the edges of the graph, producing a directed version of the original graph. As the algorithm proceeds, the virtual directions of some of the links in the graph change in order to accomplish some algorithm-specific goal. The criterion for changing link directions is based on information that is local to a node (such as the node having no outgoing links) and thus this approach scales well, a feature that is desirable for distributed algorithms. This monograph presents, in a tutorial way, a representative sampling of the work on link-reversal-based distributed algorithms. The algorithms considered solve routing, leader election, mutual exclusion, distributed queueing, scheduling, and resource allocation. The algorithms can be roughly divided into two types, those that assume a more abstract graph model of the networks, and those that take into account more realistic details of the system. In particular, these more realistic details include the communication between nodes, which may be through asynchronous message passing, and possible changes in the graph, for instance, due to movement of the nodes. We have not attempted to provide a comprehensive survey of all the literature on these topics. Instead, we have focused in depth on a smaller number of fundamental papers, whose common thread is that link reversal provides a way for nodes in the system to observe their local neighborhoods, take only local actions, and yet cause global problems to be solved. We conjecture that future interesting uses of link reversal are yet
This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full an...
详细信息
ISBN:
(数字)9783030706265
ISBN:
(纸本)9783030706258
This book constitutes thoroughly reviewed, revised and selected papers from the 6th International Conference on Human Centered Computing, HCC 2020, held in virtually, due to COVID- 19, in December 2020. The 28 full and 20 short papers presented in this volume were carefully reviewed and selected from a total of 133 submissions.
The papers contained in this volume were presented at the 13th Annual S- posium on Combinatorial Pattern Matching, held July 3–5, 2002 at the Hotel Uminonakamichi, in Fukuoka, Japan. They were selected from 37 abstra...
详细信息
ISBN:
(数字)9783540454526
ISBN:
(纸本)9783540438625
The papers contained in this volume were presented at the 13th Annual S- posium on Combinatorial Pattern Matching, held July 3–5, 2002 at the Hotel Uminonakamichi, in Fukuoka, Japan. They were selected from 37 abstracts s- mitted in response to the call for papers. In addition, there were invited lectures by Shinichi Morishita (University of Tokyo) and Hiroki Arimura (Kyushu U- versity). Combinatorial Pattern Matching (CPM) addresses issues of searching and matching strings and more complicated patterns such as trees, regular expr- sions, graphs, point sets, and arrays, in various formats. The goal is to derive n- trivial combinatorial properties of such structures and to exploit these properties in order to achieve superior performance for the corresponding computational problems. On the other hand, an important goal is to analyze and pinpoint the properties and conditions under which searches cannot be performed e?ciently. Over the past decade a steady ?ow of high-quality research on this subject has changed a sparse set of isolated results into a full-?edged area of algorithmics. This area is continuing to grow even further due to the increasing demand for speed and e?ciency that stems from important applications such as the World Wide Web, computational biology, computer vision, and multimedia systems. These involve requirements for information retrieval in heterogeneous databases, data compression, and pattern recognition. The objective of the annual CPM gathering is to provide an international forum for research in combinatorial p- tern matching and related applications.
This book will be useful to anyone who intends to use a scientific approach to the humanities, particularly music, and will appeal to anyone who is interested in the intersection between the arts and *** a foreword by...
详细信息
ISBN:
(数字)9783030637699
ISBN:
(纸本)9783030637682;9783030637712
This book will be useful to anyone who intends to use a scientific approach to the humanities, particularly music, and will appeal to anyone who is interested in the intersection between the arts and *** a foreword by Ruth Tatlow (Uppsala University), award winning author of;and;.
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for ...
详细信息
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total.
Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world’s leading scholars and practitioners. Main subject areas include:
Authentication and identification.- Block ciphers and stream ciphers.- Computational issues.- Copy protection.- Cryptanalysis and security.- Cryptographic protocols.- Electronic payment and digital certificates.- Elliptic curve cryptography.- Factorization algorithms and primality tests.- Hash functions and MACs.- Historical systems.- Identity-based cryptography.- Implementation aspects for smart cards and standards.- Key management.- Multiparty computations like voting schemes.- Public key cryptography.- Quantum cryptography.- Secret sharing schemes.- Sequences.- Web security.
The style of the entries in the
Encyclopedia of Cryptography and Security
is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest.
The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The
Encyclopedia of Cryptography and Security
will become the premier reference work on this complex subject.
暂无评论