Pattern Recognition and Machine Intelligence [[electronic resource] ] : Second International Conference, PReMI 2007, Kolkata, India, December 18-22, 2007, Proceedings / / edited by Ashish Ghosh, Rajat K. De, Sankar K Pal |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 |
Descrizione fisica | 1 online resource (XIX, 680 p.) |
Disciplina | 006.4 |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Pattern recognition systems
Computer science Artificial intelligence Application software Data mining Computer networks Automated Pattern Recognition Theory of Computation Artificial Intelligence Computer and Information Systems Applications Data Mining and Knowledge Discovery Computer Communication Networks |
ISBN | 3-540-77046-1 |
Classificazione |
004
BIO 110f DAT 708f DAT 760f DAT 770f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pattern Recognition -- Image Analysis -- Soft Computing and Applications -- Data Mining and Knowledge Discovery -- Bioinformatics -- Signal and Speech Processing -- Document Analysis and Text Mining -- Biometrics -- Video Analysis. |
Record Nr. | UNINA-9910484754903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 |
Descrizione fisica | 1 online resource (XI, 428 p.) |
Disciplina | 001.5436 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Algorithms Computer science—Mathematics Discrete mathematics Data protection Computer networks Electronic data processing—Management Cryptology Discrete Mathematics in Computer Science Data and Information Security Computer Communication Networks IT Operations |
ISBN | 3-540-77026-7 |
Classificazione |
004
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. |
Record Nr. | UNISA-996465482703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology – INDOCRYPT 2007 [[electronic resource] ] : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings / / edited by K. Srinathan, C. Pandu Rangan, Moti Yung |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 |
Descrizione fisica | 1 online resource (XI, 428 p.) |
Disciplina | 001.5436 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Algorithms Computer science—Mathematics Discrete mathematics Data protection Computer networks Electronic data processing—Management Cryptology Discrete Mathematics in Computer Science Data and Information Security Computer Communication Networks IT Operations |
ISBN | 3-540-77026-7 |
Classificazione |
004
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. |
Record Nr. | UNINA-9910484450503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications [[electronic resource] ] : 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, México, November 15-18, 2009. Proceedings / / edited by Eduardo Bayro-Corrochano, Jan-Olof Eklundh |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XXIV, 1082 p.) |
Disciplina | 004n/a |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Pattern recognition
Optical data processing Artificial intelligence Biometrics (Biology) Pattern Recognition Image Processing and Computer Vision Artificial Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Biometrics |
Soggetto genere / forma |
Guadalajara (Mexiko, 2009)
Kongress. |
ISBN |
1-280-38326-7
9786613561183 3-642-10268-9 |
Classificazione |
004
DAT 760f DAT 770f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote 1 -- Image Coding, Processing and Analysis -- Segmentation, Analysis of Shape and Texture -- Keynote 2 -- Geometric Image Processing and Analysis -- Analysis of Signal, Speech and Language -- Document Processing and Recognition -- Keynote 3 -- Feature Extraction, Clustering and Classification -- Statistical Pattern Recognition -- Neural Networks for Pattern Recognition -- Keynote 4 -- Computer Vision -- Video Segmentation and Tracking -- Robot Vision -- Keynote 5 -- Intelligent Remote Sensing Imagery Research and Discovery Techniques -- CASI 2009 Workshop I: Intelligent Computing for Remote Sensing Imagery -- CASI 2009 Workshop II: Intelligent Fussion and Classification Techniques. |
Record Nr. | UNINA-9910483617103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications [[electronic resource] ] : 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Guadalajara, Jalisco, México, November 15-18, 2009. Proceedings / / edited by Eduardo Bayro-Corrochano, Jan-Olof Eklundh |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XXIV, 1082 p.) |
Disciplina | 004n/a |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Pattern recognition
Optical data processing Artificial intelligence Biometrics (Biology) Pattern Recognition Image Processing and Computer Vision Artificial Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Biometrics |
Soggetto genere / forma |
Guadalajara (Mexiko, 2009)
Kongress. |
ISBN |
1-280-38326-7
9786613561183 3-642-10268-9 |
Classificazione |
004
DAT 760f DAT 770f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote 1 -- Image Coding, Processing and Analysis -- Segmentation, Analysis of Shape and Texture -- Keynote 2 -- Geometric Image Processing and Analysis -- Analysis of Signal, Speech and Language -- Document Processing and Recognition -- Keynote 3 -- Feature Extraction, Clustering and Classification -- Statistical Pattern Recognition -- Neural Networks for Pattern Recognition -- Keynote 4 -- Computer Vision -- Video Segmentation and Tracking -- Robot Vision -- Keynote 5 -- Intelligent Remote Sensing Imagery Research and Discovery Techniques -- CASI 2009 Workshop I: Intelligent Computing for Remote Sensing Imagery -- CASI 2009 Workshop II: Intelligent Fussion and Classification Techniques. |
Record Nr. | UNISA-996466322103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Provable Security [[electronic resource] ] : Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings / / edited by Josef Pawel Pieprzyk, Fangguo Zhang |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XII, 275 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Computer science—Mathematics Coding theory Information theory Cryptology Data Structures and Information Theory Mathematics of Computing Discrete Mathematics in Computer Science Symbolic and Algebraic Manipulation Coding and Information Theory |
Soggetto genere / forma |
Kanton (Stadt, 2009)
Kongress. |
ISBN | 3-642-04642-8 |
Classificazione |
004
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control. |
Record Nr. | UNISA-996466322603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Provable Security [[electronic resource] ] : Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings / / edited by Josef Pawel Pieprzyk, Fangguo Zhang |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XII, 275 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Data structures (Computer science) Computer science—Mathematics Coding theory Information theory Cryptology Data Structures and Information Theory Mathematics of Computing Discrete Mathematics in Computer Science Symbolic and Algebraic Manipulation Coding and Information Theory |
Soggetto genere / forma |
Kanton (Stadt, 2009)
Kongress. |
ISBN | 3-642-04642-8 |
Classificazione |
004
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- A Brief History of Security Models for Confidentiality -- Symbolic Methods for Provable Security -- Encryption -- Efficient Non-interactive Universally Composable String-Commitment Schemes -- Spatial Encryption under Simpler Assumption -- Chosen-Ciphertext Secure RSA-Type Cryptosystems -- Anonymous Conditional Proxy Re-encryption without Random Oracle -- Breaking and Fixing of an Identity Based Multi-Signcryption Scheme -- Digital Signatures -- Identity-Based Verifiably Encrypted Signatures without Random Oracles -- How to Prove Security of a Signature with a Tighter Security Reduction -- Twin Signature Schemes, Revisited -- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions -- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? -- Anonymous Signatures Revisited -- Cryptographic Protocols -- An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles -- Password Authenticated Key Exchange Based on RSA in the Three-Party Settings -- Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols -- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge -- Server-Controlled Identity-Based Authenticated Key Exchange -- Reductions and Privacy -- Oracle Separation in the Non-uniform Model -- GUC-Secure Set-Intersection Computation -- Self-enforcing Private Inference Control. |
Record Nr. | UNINA-9910484630103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Research in Computational Molecular Biology [[electronic resource] ] : 18th Annual International Conference, RECOMB 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings / / edited by Roded Sharan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVI, 464 p. 111 illus., 92 illus. in color.) |
Disciplina | 610.285 |
Collana | Lecture Notes in Bioinformatics |
Soggetto topico |
Bioinformatics
Biomathematics Data mining Algorithms Computational Biology/Bioinformatics Mathematical and Computational Biology Data Mining and Knowledge Discovery Algorithm Analysis and Problem Complexity |
Soggetto genere / forma | KongressPittsburgh, Pa.2014. |
ISBN | 3-319-05269-1 |
Classificazione |
004
BIO 110f BIO 220f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996205176103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Research in Computational Molecular Biology [[electronic resource] ] : 18th Annual International Conference, RECOMB 2014, Pittsburgh, PA, USA, April 2-5, 2014, Proceedings / / edited by Roded Sharan |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVI, 464 p. 111 illus., 92 illus. in color.) |
Disciplina | 610.285 |
Collana | Lecture Notes in Bioinformatics |
Soggetto topico |
Bioinformatics
Biomathematics Data mining Algorithms Computational Biology/Bioinformatics Mathematical and Computational Biology Data Mining and Knowledge Discovery Algorithm Analysis and Problem Complexity |
Soggetto genere / forma | KongressPittsburgh, Pa.2014. |
ISBN | 3-319-05269-1 |
Classificazione |
004
BIO 110f BIO 220f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484333503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Robust and Online Large-Scale Optimization [[electronic resource] ] : Models and Techniques for Transportation Systems / / edited by Ravindra K. Ahuja, Rolf H. Möhring, Christos D. Zaroliagis |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XVIII, 423 p.) |
Disciplina | 004n/a |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computers
Electronic digital computers—Evaluation Computers, Special purpose Computer simulation Security systems Discrete mathematics Hardware Performance and Reliability System Performance and Evaluation Special Purpose and Application-Based Systems Computer Modelling Security Science and Technology Discrete Mathematics |
ISBN | 3-642-05465-X |
Classificazione |
004
BAU 853f MAT 910f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Robustness and Recoverability: New Concepts -- The Concept of Recoverable Robustness, Linear Programming Recovery, and Railway Applications -- Recoverable Robustness in Shunting and Timetabling -- Light Robustness -- Incentive-Compatible Robust Line Planning -- A Bicriteria Approach for Robust Timetabling -- Robust Timetabling and Route Planning -- Meta-heuristic and Constraint-Based Approaches for Single-Line Railway Timetabling -- Engineering Time-Expanded Graphs for Faster Timetable Information -- Time-Dependent Route Planning -- The Exact Subgraph Recoverable Robust Shortest Path Problem -- Efficient Timetable Information in the Presence of Delays -- Robust Planning under Scarce Resources -- Integrating Robust Railway Network Design and Line Planning under Failures -- Effective Allocation of Fleet Frequencies by Reducing Intermediate Stops and Short Turning in Transit Systems -- Shunting for Dummies: An Introductory Algorithmic Survey -- Integrated Gate and Bus Assignment at Amsterdam Airport Schiphol -- Online Planning: Delay and Disruption Management -- Mining Railway Delay Dependencies in Large-Scale Real-World Delay Data -- Rescheduling Dense Train Traffic over Complex Station Interlocking Areas -- Online Train Disposition: To Wait or Not to Wait? -- Disruption Management in Passenger Railway Transportation. |
Record Nr. | UNISA-996465860203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|