LEADER 01308nam a2200361 i 4500 001 991001392459707536 008 051220s2005 de b 001 0 eng d 020 $a3540288007 035 $ab13365617-39ule_inst 040 $aDip.to Matematica$beng 082 0 $a515.73 084 $aAMS 46B20 084 $aAMS 46B15 084 $aAMS 46E15 084 $aAMS 51A10 084 $aLC QA3.L28 100 1 $aGurariy, Vladimir I.$0472493 245 10$aGeometry of Müntz spaces and related questions /$cVladimir I. Gurariy, Wolfgang Lusky 260 $aBerlin :$bSpringer,$cc2005 300 $axiii, 172 p. ;$c24 cm 440 0$aLecture notes in mathematics,$x0075-8434 ;$v1870 504 $aIncludes bibliographical references (p.[163]-169) and index 650 0$aGeometry 650 0$aBanach spaces 650 0$aGeneralized spaces 650 0$aPolynomials 700 1 $aLusky, Wolfgang$eauthor$4http://id.loc.gov/vocabulary/relators/aut$055754 907 $a.b13365617$b02-04-14$c20-12-05 912 $a991001392459707536 945 $aLE013 46B GUR11 (2005)$g1$i2013000202037$lle013$op$pE29.95$q-$rl$s- $t0$u0$v0$w0$x0$y.i14210605$z23-03-06 996 $aGeometry of Muntz spaces and related questions$91022903 997 $aUNISALENTO 998 $ale013$b20-12-05$cm$da $e-$feng$gde $h0$i0 LEADER 01505nam 2200517Ia 450 001 9910788254003321 005 20230801231953.0 010 $a0-8143-3619-1 035 $a(CKB)3170000000046060 035 $a(OCoLC)778704198 035 $a(CaPaEBR)ebrary10533497 035 $a(SSID)ssj0000581981 035 $a(PQKBManifestationID)11391622 035 $a(PQKBTitleCode)TC0000581981 035 $a(PQKBWorkID)10539770 035 $a(PQKB)11223434 035 $a(MiAaPQ)EBC3416442 035 $a(MdBmJHUP)muse15891 035 $a(Au-PeEL)EBL3416442 035 $a(CaPaEBR)ebr10533497 035 $a(OCoLC)923510668 035 $a(EXLCZ)993170000000046060 100 $a20110811d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAllegiance$b[electronic resource] $epoems /$fby Francine J. Harris 210 $aDetroit $cWayne State University Press$dc2012 215 $a1 online resource (130 p.) 225 1 $aMade in Michigan writers series 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8143-3618-3 410 0$aMade in Michigan writers series. 606 $aAmerican poetry$y20th century 615 0$aAmerican poetry 676 $a811/.6 700 $aHarris$b Francine J$01576985 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910788254003321 996 $aAllegiance$93855157 997 $aUNINA LEADER 03528nam 22007815 450 001 9910349387303321 005 20251225205518.0 010 $a9783030051716 010 $a3030051714 024 7 $a10.1007/978-3-030-05171-6 035 $a(CKB)4100000007204829 035 $a(DE-He213)978-3-030-05171-6 035 $a(MiAaPQ)EBC6248180 035 $a(PPN)232963819 035 $a(EXLCZ)994100000007204829 100 $a20181205d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Systems Security $e14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings /$fedited by Vinod Ganapathy, Trent Jaeger, R.K. Shyamasundar 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIX, 481 p. 134 illus., 83 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11281 311 08$a9783030051709 311 08$a3030051706 320 $aIncludes bibliographical references and index. 327 $aSecurity for ubiquitous computing -- Modelling and anaylsis of attacks -- Smartphone security -- Cryptography and theory -- Enterprise and cloud security -- Machine learning and security -- Privacy -- Client security and authentication. 330 $aThis book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018. The 23 revised full papers presented in this book together with 1 invited paper and 3 keynote abstracts were carefully reviewed and selected from 51 submissions. The papers are organized in the following topical sections: security for ubiquitous computing; modelling and anaylsis of attacks; smartphone security; cryptography and theory; enterprise and cloud security; machine learning and security; privacy; and client security and authentication. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11281 606 $aData protection 606 $aComputers 606 $aComputer vision 606 $aSoftware engineering 606 $aComputer networks 606 $aElectronic digital computers$xEvaluation 606 $aData and Information Security 606 $aComputing Milieux 606 $aComputer Vision 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aSystem Performance and Evaluation 615 0$aData protection. 615 0$aComputers. 615 0$aComputer vision. 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aElectronic digital computers$xEvaluation. 615 14$aData and Information Security. 615 24$aComputing Milieux. 615 24$aComputer Vision. 615 24$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aSystem Performance and Evaluation. 676 $a005.8 676 $a005.8 702 $aGanapathy$b Vinod$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJaeger$b Trent$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aShyamasundar$b R.K$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349387303321 996 $aInformation Systems Security$93660336 997 $aUNINA