Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 109
Book Description
Selected Papers from the 20th Annual ACM Symposium on the Theory of Computing, May 2-4, 1988
20th Annual ACM Symposium on the Theory of Computing
Author: Association for Computing Machinery
Publisher:
ISBN:
Category :
Languages : en
Pages : 108
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 108
Book Description
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago, Illinois, May 2-4, 1988
Author:
Publisher: Association for Computing Machinery (ACM)
ISBN:
Category : Computable functions
Languages : en
Pages : 568
Book Description
Publisher: Association for Computing Machinery (ACM)
ISBN:
Category : Computable functions
Languages : en
Pages : 568
Book Description
Proceedings of the 33rd Annual ACM Symposium on Theory of Computing
Author:
Publisher:
ISBN: 9781581133493
Category : Computable complexity
Languages : en
Pages : 784
Book Description
Publisher:
ISBN: 9781581133493
Category : Computable complexity
Languages : en
Pages : 784
Book Description
Proceedings of the 1988 Twentieth Annual ACM Symposium on Theory of Computing
Author:
Publisher:
ISBN:
Category : Computational complexity
Languages : en
Pages :
Book Description
Publisher:
ISBN:
Category : Computational complexity
Languages : en
Pages :
Book Description
... Annual ACM Symposium on Theory of Computing, STOC.
Author: Symposium on Theory of Computing
Publisher:
ISBN:
Category :
Languages : en
Pages : 109
Book Description
Publisher:
ISBN:
Category :
Languages : en
Pages : 109
Book Description
Index of Conference Proceedings
Author: British Library. Document Supply Centre
Publisher:
ISBN:
Category : Congresses and conventions
Languages : en
Pages : 984
Book Description
Publisher:
ISBN:
Category : Congresses and conventions
Languages : en
Pages : 984
Book Description
Graph Drawing and Network Visualization
Author: Michael A. Bekos
Publisher: Springer Nature
ISBN: 3031492757
Category : Computers
Languages : en
Pages : 280
Book Description
This two-volume set LNCS 14465-14466 constitutes the proceedings of the 31st International Symposium on Graph Drawing and Network Visualization, GD 2023, held in Isola delle Femmine, Palermo, Italy, in September 2023. The 31 full papers, 7 short papers, presented together with 2 invited talks, and one contest report, were thoroughly reviewed and selected from the 100 submissions. The abstracts of 11 posters presented at the conference can be found in the back matter of the volume. The contributions were organized in topical sections as follows: beyond planarity; crossing numbers; linear layouts; geometric aspects; visualization challenges; graph representations; graph decompositions; topological aspects; parameterized complexity for drawings; planar graphs; frameworks; algorithmics.
Publisher: Springer Nature
ISBN: 3031492757
Category : Computers
Languages : en
Pages : 280
Book Description
This two-volume set LNCS 14465-14466 constitutes the proceedings of the 31st International Symposium on Graph Drawing and Network Visualization, GD 2023, held in Isola delle Femmine, Palermo, Italy, in September 2023. The 31 full papers, 7 short papers, presented together with 2 invited talks, and one contest report, were thoroughly reviewed and selected from the 100 submissions. The abstracts of 11 posters presented at the conference can be found in the back matter of the volume. The contributions were organized in topical sections as follows: beyond planarity; crossing numbers; linear layouts; geometric aspects; visualization challenges; graph representations; graph decompositions; topological aspects; parameterized complexity for drawings; planar graphs; frameworks; algorithmics.
Theory of Computing
Information Security and Cryptology -- ICISC 2012
Author: Taekyoung Kwon
Publisher: Springer
ISBN: 3642376827
Category : Computers
Languages : en
Pages : 525
Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.
Publisher: Springer
ISBN: 3642376827
Category : Computers
Languages : en
Pages : 525
Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.