top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Pattern Recognition and Machine Intelligence [[electronic resource] ] : Second International Conference, PReMI 2007, Kolkata, India, December 18-22, 2007, Proceedings / / edited by Ashish Ghosh, Rajat K. De, Sankar K Pal
Pattern Recognition and Machine Intelligence [[electronic resource] ] : Second International Conference, PReMI 2007, Kolkata, India, December 18-22, 2007, Proceedings / / edited by Ashish Ghosh, Rajat K. De, Sankar K Pal
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XIX, 680 p.)
Disciplina 006.4
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Pattern recognition systems
Computer science
Artificial intelligence
Application software
Data mining
Computer networks
Automated Pattern Recognition
Theory of Computation
Artificial Intelligence
Computer and Information Systems Applications
Data Mining and Knowledge Discovery
Computer Communication Networks
ISBN 3-540-77046-1
Classificazione 004
BIO 110f
DAT 708f
DAT 760f
DAT 770f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pattern Recognition -- Image Analysis -- Soft Computing and Applications -- Data Mining and Knowledge Discovery -- Bioinformatics -- Signal and Speech Processing -- Document Analysis and Text Mining -- Biometrics -- Video Analysis.
Record Nr. UNINA-9910484754903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 428 p.)
Disciplina 001.5436
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Discrete mathematics
Data protection
Computer networks
Electronic data processing—Management
Cryptology
Discrete Mathematics in Computer Science
Data and Information Security
Computer Communication Networks
IT Operations
ISBN 3-540-77026-7
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.
Record Nr. UNISA-996465482703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 428 p.)
Disciplina 001.5436
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Discrete mathematics
Data protection
Computer networks
Electronic data processing—Management
Cryptology
Discrete Mathematics in Computer Science
Data and Information Security
Computer Communication Networks
IT Operations
ISBN 3-540-77026-7
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.
Record Nr. UNINA-9910484450503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications [[electronic resource] ] : 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, México, November 15-18, 2009. Proceedings / / edited by Eduardo Bayro-Corrochano, Jan-Olof Eklundh
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications [[electronic resource] ] : 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, México, November 15-18, 2009. Proceedings / / edited by Eduardo Bayro-Corrochano, Jan-Olof Eklundh
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XXIV, 1082 p.)
Disciplina 004n/a
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Pattern recognition
Optical data processing
Artificial intelligence
Biometrics (Biology)
Pattern Recognition
Image Processing and Computer Vision
Artificial Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Biometrics
Soggetto genere / forma Guadalajara (Mexiko, 2009)
Kongress.
ISBN 1-280-38326-7
9786613561183
3-642-10268-9
Classificazione 004
DAT 760f
DAT 770f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote 1 -- Image Coding, Processing and Analysis -- Segmentation, Analysis of Shape and Texture -- Keynote 2 -- Geometric Image Processing and Analysis -- Analysis of Signal, Speech and Language -- Document Processing and Recognition -- Keynote 3 -- Feature Extraction, Clustering and Classification -- Statistical Pattern Recognition -- Neural Networks for Pattern Recognition -- Keynote 4 -- Computer Vision -- Video Segmentation and Tracking -- Robot Vision -- Keynote 5 -- Intelligent Remote Sensing Imagery Research and Discovery Techniques -- CASI 2009 Workshop I: Intelligent Computing for Remote Sensing Imagery -- CASI 2009 Workshop II: Intelligent Fussion and Classification Techniques.
Record Nr. UNINA-9910483617103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications [[electronic resource] ] : 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, México, November 15-18, 2009. Proceedings / / edited by Eduardo Bayro-Corrochano, Jan-Olof Eklundh
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications [[electronic resource] ] : 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, México, November 15-18, 2009. Proceedings / / edited by Eduardo Bayro-Corrochano, Jan-Olof Eklundh
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XXIV, 1082 p.)
Disciplina 004n/a
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Pattern recognition
Optical data processing
Artificial intelligence
Biometrics (Biology)
Pattern Recognition
Image Processing and Computer Vision
Artificial Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Biometrics
Soggetto genere / forma Guadalajara (Mexiko, 2009)
Kongress.
ISBN 1-280-38326-7
9786613561183
3-642-10268-9
Classificazione 004
DAT 760f
DAT 770f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote 1 -- Image Coding, Processing and Analysis -- Segmentation, Analysis of Shape and Texture -- Keynote 2 -- Geometric Image Processing and Analysis -- Analysis of Signal, Speech and Language -- Document Processing and Recognition -- Keynote 3 -- Feature Extraction, Clustering and Classification -- Statistical Pattern Recognition -- Neural Networks for Pattern Recognition -- Keynote 4 -- Computer Vision -- Video Segmentation and Tracking -- Robot Vision -- Keynote 5 -- Intelligent Remote Sensing Imagery Research and Discovery Techniques -- CASI 2009 Workshop I: Intelligent Computing for Remote Sensing Imagery -- CASI 2009 Workshop II: Intelligent Fussion and Classification Techniques.
Record Nr. UNISA-996466322103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings / / edited by Josef Pawel Pieprzyk, Fangguo Zhang
Provable Security [[electronic resource] ] : Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings / / edited by Josef Pawel Pieprzyk, Fangguo Zhang
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XII, 275 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Computer science—Mathematics
Coding theory
Information theory
Cryptology
Data Structures and Information Theory
Mathematics of Computing
Discrete Mathematics in Computer Science
Symbolic and Algebraic Manipulation
Coding and Information Theory
Soggetto genere / forma Kanton (Stadt, 2009)
Kongress.
ISBN 3-642-04642-8
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control.
Record Nr. UNISA-996466322603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings / / edited by Josef Pawel Pieprzyk, Fangguo Zhang
Provable Security [[electronic resource] ] : Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings / / edited by Josef Pawel Pieprzyk, Fangguo Zhang
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XII, 275 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data structures (Computer science)
Computer science—Mathematics
Coding theory
Information theory
Cryptology
Data Structures and Information Theory
Mathematics of Computing
Discrete Mathematics in Computer Science
Symbolic and Algebraic Manipulation
Coding and Information Theory
Soggetto genere / forma Kanton (Stadt, 2009)
Kongress.
ISBN 3-642-04642-8
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control.
Record Nr. UNINA-9910484630103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Research in Computational Molecular Biology [[electronic resource] ] : 18th Annual International Conference, RECOMB 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings / / edited by Roded Sharan
Research in Computational Molecular Biology [[electronic resource] ] : 18th Annual International Conference, RECOMB 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings / / edited by Roded Sharan
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 464 p. 111 illus., 92 illus. in color.)
Disciplina 610.285
Collana Lecture Notes in Bioinformatics
Soggetto topico Bioinformatics
Biomathematics
Data mining
Algorithms
Computational Biology/Bioinformatics
Mathematical and Computational Biology
Data Mining and Knowledge Discovery
Algorithm Analysis and Problem Complexity
Soggetto genere / forma KongressPittsburgh, Pa.2014.
ISBN 3-319-05269-1
Classificazione 004
BIO 110f
BIO 220f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996205176103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Research in Computational Molecular Biology [[electronic resource] ] : 18th Annual International Conference, RECOMB 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings / / edited by Roded Sharan
Research in Computational Molecular Biology [[electronic resource] ] : 18th Annual International Conference, RECOMB 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings / / edited by Roded Sharan
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 464 p. 111 illus., 92 illus. in color.)
Disciplina 610.285
Collana Lecture Notes in Bioinformatics
Soggetto topico Bioinformatics
Biomathematics
Data mining
Algorithms
Computational Biology/Bioinformatics
Mathematical and Computational Biology
Data Mining and Knowledge Discovery
Algorithm Analysis and Problem Complexity
Soggetto genere / forma KongressPittsburgh, Pa.2014.
ISBN 3-319-05269-1
Classificazione 004
BIO 110f
BIO 220f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484333503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Robust and Online Large-Scale Optimization [[electronic resource] ] : Models and Techniques for Transportation Systems / / edited by Ravindra K. Ahuja, Rolf H. Möhring, Christos D. Zaroliagis
Robust and Online Large-Scale Optimization [[electronic resource] ] : Models and Techniques for Transportation Systems / / edited by Ravindra K. Ahuja, Rolf H. Möhring, Christos D. Zaroliagis
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XVIII, 423 p.)
Disciplina 004n/a
Collana Theoretical Computer Science and General Issues
Soggetto topico Computers
Electronic digital computers—Evaluation
Computers, Special purpose
Computer simulation
Security systems
Discrete mathematics
Hardware Performance and Reliability
System Performance and Evaluation
Special Purpose and Application-Based Systems
Computer Modelling
Security Science and Technology
Discrete Mathematics
ISBN 3-642-05465-X
Classificazione 004
BAU 853f
MAT 910f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Robustness and Recoverability: New Concepts -- The Concept of Recoverable Robustness, Linear Programming Recovery, and Railway Applications -- Recoverable Robustness in Shunting and Timetabling -- Light Robustness -- Incentive-Compatible Robust Line Planning -- A Bicriteria Approach for Robust Timetabling -- Robust Timetabling and Route Planning -- Meta-heuristic and Constraint-Based Approaches for Single-Line Railway Timetabling -- Engineering Time-Expanded Graphs for Faster Timetable Information -- Time-Dependent Route Planning -- The Exact Subgraph Recoverable Robust Shortest Path Problem -- Efficient Timetable Information in the Presence of Delays -- Robust Planning under Scarce Resources -- Integrating Robust Railway Network Design and Line Planning under Failures -- Effective Allocation of Fleet Frequencies by Reducing Intermediate Stops and Short Turning in Transit Systems -- Shunting for Dummies: An Introductory Algorithmic Survey -- Integrated Gate and Bus Assignment at Amsterdam Airport Schiphol -- Online Planning: Delay and Disruption Management -- Mining Railway Delay Dependencies in Large-Scale Real-World Delay Data -- Rescheduling Dense Train Traffic over Complex Station Interlocking Areas -- Online Train Disposition: To Wait or Not to Wait? -- Disruption Management in Passenger Railway Transportation.
Record Nr. UNISA-996465860203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui