Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics, mathematics, cryptography, coding theory and processor theory.
This text combines a practical, hands-on approach to programming with the introduction of sound theoretical support focused on teaching the construction of high-quality software. A major feature of the book is the use of Design by Contract.
This book provides a comprehensive study of complexity results and optimal and suboptimal algorithms concerning time-dependent scheduling in single-, parallel- and dedicated-machine environments. This is the first monograph on time-dependent scheduling.
This book presents a detailed examination of the principles of tile-based online mapping systems. Topics include discussions of projections, coordinate systems, image processing, data basing and indexing requirements and web access.
How is it that one system is better than another to its stakeholders? This question drove Christopher Alexander’s quest to explain great physical architecture. This book translates his ideas into the abstract domain of information systems and modeling.
This book focuses on five hot research directions in 3D model analysis and processing in computer science: compression, feature extraction, content-based retrieval, irreversible watermarking and reversible watermarking.