LEADER 01158nam a2200325 i 4500 001 991000777069707536 005 20020507173442.0 008 940512s1989 uk ||| | eng 020 $a0306431890 035 $ab10755779-39ule_inst 035 $aLE01302156$9ExL 040 $aDip.to Matematica$beng 082 0 $a004.6 084 $aAMS 68M10 084 $aCR C.2 100 1 $aSunshine, Carl A.$025530 245 10$aComputer network architectures and protocols /$cedited by Carl A. Sunshine 250 $a2nd ed 260 $aNew York ; London :$bPlenum Press,$cc1989 300 $axiv, 543 p. :$bill. ;$c24 cm 490 0 $aApplications of communications theory 500 $aIncludes bibliographical references 650 4$aComputer network architectures 650 4$aComputer network protocols 907 $a.b10755779$b23-02-17$c28-06-02 912 $a991000777069707536 945 $aLE013 68M SUN11 (1990)$g1$i2013000289076$lle013$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10850028$z28-06-02 996 $aComputer network architectures and protocols$9911201 997 $aUNISALENTO 998 $ale013$b01-01-94$cm$da $e-$feng$guk $h0$i1 LEADER 05510nam 22006015 450 001 9910254815003321 005 20251225211009.0 010 $a981-10-4642-5 024 7 $a10.1007/978-981-10-4642-1 035 $a(CKB)3850000000027473 035 $a(DE-He213)978-981-10-4642-1 035 $a(MiAaPQ)EBC6302726 035 $a(MiAaPQ)EBC5577691 035 $a(Au-PeEL)EBL5577691 035 $a(OCoLC)982736530 035 $a(PPN)200513192 035 $a(EXLCZ)993850000000027473 100 $a20170415d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMathematics and Computing $eThird International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedings /$fedited by Debasis Giri, Ram N. Mohapatra, Heinrich Begehr, Mohammad S. Obaidat 205 $a1st ed. 2017. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2017. 215 $a1 online resource (XX, 424 p. 51 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v655 311 08$a981-10-4641-7 320 $aIncludes bibliographical references and index. 327 $aSecurity and privacy -- Design of a certicateless designated server based searchable public key encryption scheme -- On the Security of a Searchable Anonymous Attribute Based Encryption -- Security on "Secure Remote Login Scheme with Password and Smart Card Update Facilities? -- Design of Secure and Efficient Electronic Payment System for Mobile Users -- A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection -- Computing -- A Note on the Optimal Immunity of Boolean Functions against Fast Algebraic Attacks -- Study of Five?Neighborhood Linear Hybrid Cellular Automata and their Synthesis -- Cache optimized solution for sparse linear system over large order finite field -- Connected Fair Domination in Graphs -- Coordinating Particle Swarm Optimization, Ant Colony Optimization and K?Opt algorithm for Traveling Salesman Problem -- FASER128 and its countermeasure -- Modelling of Aircraft?s Dynamics Using Least Square Support Vector Machine Regression -- Accommodative FAS?FMG multilevel based meshfree augmented RBF?FD method for Navier?Stokes equations in spherical geometry -- Applied Mathematics. Bessel sequences and Frames in Semi?inner product Spaces -- Finiteness of Criss?Cross Method in Complementarity Problem -- Imprecise Constrained Covering Solid Travelling Salesman Problem with Credibility -- Newton Like Line Search Method using q?Calculus -- Existence results of a generalized mixed exponential type vector variational?like inequalities. - On Approximate Solutions to One Class of Nonlinear Differential Equations -- A Davidon?Fletcher?Powell Type Quasi?Newton Method to Solve Fuzzy Optimization Problems -- Bifurcation analysis of a delayed modified Holling?Tanner predator?prey model with refuge -- Improvement of analytical solution to the inverse truly nonlinear oscillator by Extended Iterative method. - Constrained Data Visualization using Rational Bi?cubic Fractal Functions -- Electrokinetic flow in a surface corrugated microchannel -- Pure Mathematics -- Fundamental solutions to the Laplacian in plane domains bounded by ellipses -- A Nice Representation for a Link between Bernstein?Durrmeyer and Kantorovich Operators -- Construction of Fractal Bases for Spaces of Functions. ? Infinite Matrices Bounded on Weighted $c_0$ Space -- Mapping properties of one class of quasielliptic operators -- $\mathcal{I}_\lambda$? Double Statistical Convergence In Topological Groups -- Superconvergence results for Volterra?Urysohn integral equations of second kind -- Derivations on Lie Ideals of Prime Gamma?Rings -- 4.9 $\lambda_{d}$? Statistical convergence, $\lambda_{d}$? statistical boundedness and strong $\left( V,\lambda \right) _{d}?$summability\ in metric spaces -- On Gamma?rings with Permuting Skew Tri?derivations -- A Higher Order Implicit Method for Numerical Solution of Singular Initial Value Problems. 330 $aThis book constitutes the proceedings of the Third International Conference on Mathematics and Computing, ICMC 2017, held in Haldia, India, in January 2017. The 35 papers presented in this volume were carefully reviewed and selected from 129 submissions. They were organized in topical sections named: security and privacy; computing; applied mathematics; and pure mathematics. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v655 606 $aData protection 606 $aComputer science$xMathematics 606 $aData and Information Security 606 $aMathematics of Computing 615 0$aData protection. 615 0$aComputer science$xMathematics. 615 14$aData and Information Security. 615 24$aMathematics of Computing. 676 $a004 702 $aGiri$b Debasis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMohapatra$b Ram N$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBegehr$b Heinrich$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aObaidat$b Mohammad S$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254815003321 996 $aMathematics and computing$91522892 997 $aUNINA