1.

Record Nr.

UNISA996466019503316

Titolo

Transactions on Computational Science [[electronic resource] ] . XI : special issue on security in computing . Part II / / Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)

Pubbl/distr/stampa

Berlin, : Springer, 2010

ISBN

1-283-47743-2

9786613477439

3-642-17697-6

Edizione

[1st ed. 2010.]

Descrizione fisica

1 online resource (XVIII, 294 p. 122 illus., 48 illus. in color.)

Collana

Lecture notes in computer science, , 0302-9743 ; ; 6480

Altri autori (Persone)

GavrilovaMarina L

TanC. J. Kenneth (Chih Jeng Kenneth)

MorenoEdward D

Disciplina

004.6

Soggetti

Computational complexity

Computer science

Numerical calculations - Data processing

Research - Data processing

Science - Data processing

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Sommario/riassunto

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions and enabling industrial users to apply techniques of



leading-edge, large-scale, high performance computational methods. The 11th issue of the Transactions on Computational Science journal, edited by Edward David Moreno, is the second of two publications focusing on security in computing. The 14 papers in the volume address a wide range of hot topics within the sphere of security research, including new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications.