top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Processing in Cells and Tissues [[electronic resource] ] : 10th International Conference, IPCAT 2015, San Diego, CA, USA, September 14-16, 2015, Proceedings / / edited by Michael Lones, Andy Tyrrell, Stephen Smith, Gary Fogel
Information Processing in Cells and Tissues [[electronic resource] ] : 10th International Conference, IPCAT 2015, San Diego, CA, USA, September 14-16, 2015, Proceedings / / edited by Michael Lones, Andy Tyrrell, Stephen Smith, Gary Fogel
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (VIII, 233 p. 94 illus.)
Disciplina 574.875
Collana Theoretical Computer Science and General Issues
Soggetto topico Bioinformatics
Computer science
Computer science—Mathematics
Pattern recognition systems
Computational and Systems Biology
Theory of Computation
Mathematical Applications in Computer Science
Automated Pattern Recognition
ISBN 3-319-23108-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Biochemical Information Processing -- Surface-Immobilised DNA Molecular Machines for Information Processing -- 1 Information Processing with Bioelectronic Systems -- 2 Experimental Studies of DNA Machines on Surfaces -- 2.1 Materials and Methods -- 2.2 Experimental Results -- 3 Conclusion -- References -- Scalable Design of Logic Circuits Using an Active Molecular Spider System -- 1 Introduction -- 2 Model Description -- 3 Logic Circuit Construction -- 3.1 Normal Sites and Functional Sites -- 3.2 Designs of the AND and OR Gates -- 3.3 Design of the NOT Gate -- 3.4 Gate Cascades -- 3.5 Complexity Analysis -- 4 Formal Definition of the Model -- 4.1 Site Types and Transition Rules -- 4.2 Model Definition -- 5 Conclusions and Discussions -- References -- Organic Mathematics: On the Extension of Logics from Physical Atoms to Cellular Information Processes -- Abstract -- 1 Introduction -- 1.1 The Symbolic Gap -- 1.2 The Logical Gap -- 2 A Novel Electrical Notation for the Bio-chemical Sciences -- 2.1 Origins of Atomic Numbers -- 2.2 Extensions of the Atomic Numbers -- 3 Perplex Notation and Physical Dependence of Organic Operands and Operations -- 3.1 Physically Independent and Interdependent Electrical Particles -- 3.2 Constraints on Formal Electrical Logics -- 4 Mereology and Electrically Labeled Bipartite Graphs -- 4.1 Ratiocinations -- 4.2 Mereology -- 5 Conclusions -- 5.1 The Role of Hybridizations of Logics in Organic Mathematics -- 5.2 Future Work and International Collaboration -- 6 Summary -- References -- Collective and Distributed Behaviour -- An Ecosystem Algorithm for the Dynamic Redistribution of Bicycles in London -- 1 Introduction -- 2 Background -- 3 Problem Description -- 3.1 Problem Overview -- 3.2 Performance Indicators -- 3.3 Datasets -- 4 Method -- 4.1 Assumptions and Restrictions.
4.2 Bicycle Distribution Simulator -- 4.3 Truck Scheduling Algorithms -- 5 Experiments -- 6 Results and Analysis -- 7 Conclusion and Future Work -- 7.1 Conclusion -- 7.2 Future Work -- References -- Evolving Ensembles: What Can We Learn from Biological Mutualisms? -- 1 Introduction -- 2 Evolving Ensembles -- 3 Biological Mutualism -- 4 Mutualistic Evolutionary Algorithms -- 5 Evolving Mutualistic Ensembles -- 5.1 Promoting Mutuality -- 5.2 Identifying Partners -- 6 Conclusions -- References -- An Artificial Immune System for Self-Healing in Swarm Robotic Systems -- 1 Introduction -- 2 Robotic Swarm Taxis -- 2.1 Anchoring of the Swarm -- 3 Initial Investigations into the -algorithm -- 3.1 Experimental Protocol -- 4 Immune Inspiration: Granuloma Formation -- 4.1 Granuloma Formation Algorithm -- 5 Experimental Investigation: Granuloma Formation Algorithm -- 5.1 Results -- 5.2 Maintaining Energy Across the Swarm -- 6 Conclusion -- References -- Team Search Tactics Through Multi-Agent HyperNEAT -- 1 Introduction -- 2 Background -- 2.1 NeuroEvolution of Augmenting Topologies (NEAT) -- 2.2 CPPNs and HyperNEAT -- 2.3 Multi-Agent HyperNEAT -- 3 Experimental Method -- 3.1 Search Task -- 3.2 Agent Simulator -- 3.3 Sensing Tactical Environments -- 3.4 MA-HyperNEAT Agents -- 3.5 Scripted Agents -- 3.6 Evolution and Evaluation -- 4 Results -- 5 Conclusion -- References -- Patterning and Rhythm Generation -- miRNA Regulation of Human Embryonic Stem Cell Differentiation -- Abstract -- 1 Introduction -- 1.1 miRNA Dynamics and During hESC Differentiation -- 1.2 Chemical Regulators of Pluripotency -- 2 Methods -- 2.1 Stem Cell Culture and Differentiation -- 2.2 RNA Preparation -- 2.3 Network Analysis -- 3 Results -- 3.1 Correlated Expression of miRNAs During hESC Differentiation -- 3.2 Global Network Analysis.
3.3 Effect of Gö6976 on miRNA Expression During DE Formation -- 4 Discussion -- Acknowledgements -- Motifs Within Genetic Regulatory Networks Increase Organization During Pattern Formation -- 1 Introduction -- 2 Motifs Within Gene Regulatory Networks -- 3 Multicellular Model and Implementation -- 4 Methodology -- 4.1 Information Complexity -- 5 Results -- 6 Discussion -- References -- Harmonic Versus Chaos Controlled Oscillators in Hexapedal Locomotion -- 1 Introduction -- 2 Central Pattern Generators -- 2.1 Hopf Oscillator -- 2.2 Wu Oscillator -- 3 Interlimb Coordination -- 3.1 Hopf Oscillator -- 3.2 Chaos Controlled Wu Oscillator -- 4 Coupled Artificial Signalling Network -- 5 Controlling Legged Robot Locomotion -- 5.1 Gait Generation -- 5.2 Evolving Coupled Artificial Signalling Networks -- 6 Results -- 7 Conclusions -- References -- Biochemical Regulatory Networks -- Switching Gene Regulatory Networks -- 1 Introduction -- 2 Background -- 3 Switching Gene Regulatory Networks -- 4 SGRN Model Synthesis -- 5 Experimental Results -- 5.1 Benchmark Design -- 5.2 Results -- 6 Related Work -- 7 Conclusion -- References -- The Role of Ago2 in microRNA Biogenesis: An Investigation of miR-21 -- Abstract -- 1 Introduction -- 1.1 Ago2 -- 1.2 miR-21 -- 1.3 Summary -- 2 Methods -- 3 Results -- 4 Discussion -- Acknowledgements -- Evolving Efficient Solutions to Complex Problems Using the Artificial Epigenetic Network -- 1 Introduction -- 2 Background -- 3 The Artificial Epigenetic Network -- 3.1 Artificial Genes -- 3.2 Artificial Epigenetics -- 3.3 Adaptations -- 4 Methodology -- 4.1 Coupled Inverted Pendulums -- 4.2 Processor Scheduling -- 4.3 Towers of Hanoi -- 5 Results -- 5.1 Coupled Inverted Pendulums -- 5.2 Processor Scheduling -- 5.3 Towers of Hanoi -- 6 Conclusions -- References -- Metabolomics and Phenotypes.
Sensitivity of Contending Cellular Objectives in the Central Carbon Metabolism of Escherichia Coli -- 1 Introduction -- 2 Materials and Methods -- 3 Results -- References -- Towards a Graph-Theoretic Approach to Hybrid Performance Prediction from Large-Scale Phenotypic Data -- 1 Introduction -- 2 Dataset -- 3 Method -- 3.1 Problem Definition -- 3.2 Data Normalization -- 3.3 A Graph-Theoretic Approach for Predictive Breeding -- 4 Results -- 4.1 Biomass Performance Prediction -- 5 Conclusion and Future Work -- References -- Automated Motion Analysis of Adherent Cells in Monolayer Culture -- Abstract -- 1 Introduction -- 2 Methods -- 2.1 Cell Culture and Videomicroscopy -- 2.2 Cell Tracking -- 2.3 Feature Extraction -- 2.4 Choice of Features -- 2.4.1 Cell Migration Speed -- 2.4.2 Cell Migration Persistence -- 3 Results -- 4 Conclusion and Discussion -- References -- Neural Modelling and Neural Networks -- Community Detection as Pattern Restoration by Attractor Neural-Network Dynamics -- Abstract -- 1 Introduction -- 2 Methods -- 2.1 Neural-Network Dynamics -- 2.2 Imperfect and Inaccurate Set of Source Nodes: Deteriorated Pattern -- 2.3 Local Community Detection -- 2.4 State-of-the-Art Study -- 2.5 Biological Relevance -- 3 Results -- 3.1 Local Detection of Communities from Synthetic Benchmark Networks -- 3.2 Local Detection of Communities from Real Social Networks -- 4 Discussion -- Acknowledgments -- Appendix: Synthetic Benchmark Network -- References -- Feature Learning HyperNEAT: Evolving Neural Networks to Extract Features for Classification of Maritime Satellite Imagery -- 1 Intro -- 2 Background -- 2.1 BCCT200 -- 2.2 NeuroEvolution of Augmenting Topologies (NEAT) -- 2.3 CPPNs and HyperNEAT -- 3 Feature Learning HyperNEAT -- 4 Experimental Setup -- 5 Results -- 6 Discussion and Conclusion -- A Result Standard Deviations -- References.
Improving Crossover of Neural Networks in Evolution Through Speciation -- 1 Introduction -- 2 NeuroEvolution of Augmenting Topologies (NEAT) -- 3 Speciation Heuristics -- 4 Experimental Approach -- 5 Results -- 6 Discussion -- 7 Conclusion -- A NEAT Parameters Shared Across Experiments -- References -- Author Index.
Record Nr. UNINA-9910483824003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Processing in Cells and Tissues [[electronic resource] ] : 9th International Conference, IPCAT 2012, Cambridge, UK, March 31 -- April 2, 2012, Proceedings / / edited by Michael A. Lones, Stephen L. Smith, Sarah Teichmann, Felix Naef, Jonathan Oliver, Martin Albrecht Trefzer
Information Processing in Cells and Tissues [[electronic resource] ] : 9th International Conference, IPCAT 2012, Cambridge, UK, March 31 -- April 2, 2012, Proceedings / / edited by Michael A. Lones, Stephen L. Smith, Sarah Teichmann, Felix Naef, Jonathan Oliver, Martin Albrecht Trefzer
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XII, 278 p. 120 illus.)
Disciplina 616.02/77
Collana Theoretical Computer Science and General Issues
Soggetto topico Bioinformatics
Computer science
Computer science—Mathematics
Pattern recognition systems
Computational and Systems Biology
Theory of Computation
Mathematical Applications in Computer Science
Automated Pattern Recognition
ISBN 3-642-28792-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466267303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 508 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer science—Mathematics
Computer programming
Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Mathematics of Computing
Programming Techniques
Cryptology
Data and Information Security
Mathematical Applications in Computer Science
ISBN 3-642-04474-3
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. UNISA-996465314903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Information Security [[electronic resource] ] : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings / / edited by Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 508 p.)
Disciplina 005.822gerDNB
Collana Security and Cryptology
Soggetto topico Computer science—Mathematics
Computer programming
Cryptography
Data encryption (Computer science)
Data protection
Algorithms
Mathematics of Computing
Programming Techniques
Cryptology
Data and Information Security
Mathematical Applications in Computer Science
ISBN 3-642-04474-3
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis and Optimization of Cryptographically Generated Addresses -- Security Analysis of the PACE Key-Agreement Protocol -- Towards Security Notions for White-Box Cryptography -- A Calculus to Detect Guessing Attacks -- Hash Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL -- On Free-Start Collisions and Collisions for TIB3 -- Database Security and Biometrics -- Detection of Database Intrusion Using a Two-Stage Fuzzy System -- Combining Consistency and Confidentiality Requirements in First-Order Databases -- Cancelable Iris Biometrics Using Block Re-mapping and Image Warping -- Iris Recognition in Nonideal Situations -- Algebraic Attacks and Proxy Re-Encryption -- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security -- Practical Algebraic Attacks on the Hitag2 Stream Cipher -- A New Construction of Boolean Functions with Maximum Algebraic Immunity -- Distributed System Security -- A2M: Access-Assured Mobile Desktop Computing -- Automated Spyware Collection and Analysis -- Towards Unifying Vulnerability Information for Attack Graph Construction -- Traitor Tracing without A Priori Bound on the Coalition Size -- SISR – A New Model for Epidemic Spreading of Electronic Threats -- Identity Management and Authentication -- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement -- Robust Authentication Using Physically Unclonable Functions -- Risks of the CardSpace Protocol -- Applied Cryptography -- Fair E-Cash: Be Compact, Spend Faster -- On the Security of Identity Based Ring Signcryption Schemes -- A Storage Efficient Redactable Signature in the Standard Model -- Generic Construction of Stateful Identity Based Encryption -- Access Control -- Privacy-Aware Attribute-Based Encryption with User Accountability -- Hardware-Assisted Application-Level Access Control -- Towards Trustworthy Delegation in Role-Based Access Control Model -- Secure Interoperation in Multidomain Environments Employing UCON Policies -- Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control -- MAC and Nonces -- Nonce Generators and the Nonce Reset Problem -- MAC Precomputation with Applications to Secure Memory -- HMAC without the “Second” Key -- P2P and Web Services -- Adding Trust to P2P Distribution of Paid Content -- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale -- F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Record Nr. UNINA-9910484216603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / / edited by Heung Youl Youm, Moti Yung
Information Security Applications [[electronic resource] ] : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / / edited by Heung Youl Youm, Moti Yung
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 386 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer science—Mathematics
Discrete mathematics
Data protection
Algorithms
Cryptology
Computer Communication Networks
Discrete Mathematics in Computer Science
Data and Information Security
Mathematical Applications in Computer Science
ISBN 1-280-38536-7
9786613563286
3-642-10838-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Record Nr. UNISA-996465916903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Applications [[electronic resource] ] : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / / edited by Heung Youl Youm, Moti Yung
Information Security Applications [[electronic resource] ] : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / / edited by Heung Youl Youm, Moti Yung
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 386 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Computer science—Mathematics
Discrete mathematics
Data protection
Algorithms
Cryptology
Computer Communication Networks
Discrete Mathematics in Computer Science
Data and Information Security
Mathematical Applications in Computer Science
ISBN 1-280-38536-7
9786613563286
3-642-10838-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Record Nr. UNINA-9910483065303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Theory and Coding - Solved Problems [[electronic resource] /] / by Predrag Ivaniš, Dušan Drajić
Information Theory and Coding - Solved Problems [[electronic resource] /] / by Predrag Ivaniš, Dušan Drajić
Autore Ivaniš Predrag
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (VIII, 517 p. 252 illus.)
Disciplina 621.382
Soggetto topico Electrical engineering
Coding theory
Information theory
Computer science—Mathematics
Computer mathematics
Communications Engineering, Networks
Coding and Information Theory
Mathematical Applications in Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Information Sources -- Data Compression -- Information Channels -- Block Codes -- Cyclic Codes -- Convolutional Codes and Viterbi Algorithm -- Trellis Decoding of Linear Block Codes, Turbo Codes -- Low Density Parity Check Codes.
Record Nr. UNINA-9910155298803321
Ivaniš Predrag  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Input modeling with phase-type distributions and Markov models [[electronic resource] ] : theory and applications / / by Peter Buchholz, Jan Kriege, Iryna Felko
Input modeling with phase-type distributions and Markov models [[electronic resource] ] : theory and applications / / by Peter Buchholz, Jan Kriege, Iryna Felko
Autore Buchholz Peter
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (137 p.)
Disciplina 519.233
Collana SpringerBriefs in Mathematics
Soggetto topico Probabilities
Mathematical models
Computer software
Computer science—Mathematics
Computer mathematics
Probability Theory and Stochastic Processes
Mathematical Modeling and Industrial Mathematics
Mathematical Software
Mathematical Applications in Computer Science
ISBN 3-319-06674-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Phase Type Distributions -- 3. Parameter Fitting for Phase Type Distributions -- 4. Markovian Arrival Processes -- 5. Parameter Fitting of MAPs -- 6. Stochastic Models including PH Distributions and MAPs -- 7. Software Tools -- 8. Conclusion -- References -- Index.
Record Nr. UNINA-9910300155503321
Buchholz Peter  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Integration of AI and OR Techniques in Constraint Programming [[electronic resource] ] : 13th International Conference, CPAIOR 2016, Banff, AB, Canada, May 29 - June 1, 2016, Proceedings / / edited by Claude-Guy Quimper
Integration of AI and OR Techniques in Constraint Programming [[electronic resource] ] : 13th International Conference, CPAIOR 2016, Banff, AB, Canada, May 29 - June 1, 2016, Proceedings / / edited by Claude-Guy Quimper
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIX, 421 p. 123 illus.)
Disciplina 005.116
Collana Theoretical Computer Science and General Issues
Soggetto topico Numerical analysis
Computer science—Mathematics
Discrete mathematics
Algorithms
Artificial intelligence
Operations research
Management science
Numerical Analysis
Mathematical Applications in Computer Science
Discrete Mathematics in Computer Science
Artificial Intelligence
Operations Research, Management Science
ISBN 3-319-33954-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On CNF Encodings for Decision Diagrams -- Time-Series Constraints: Improvements and Application in CP and MIP Contexts -- Finding a Collection of MUSes Incrementally -- Decompositions Based on Decision Diagrams -- Logic-Based Decomposition Methods for the Travelling Purchaser Problem -- Lagrangian Decomposition via Subproblem Search -- Non-linear Optimization of Business Models in the Electricity Market -- Weighted Spanning Tree Constraint with Explanations -- Forward-Checking ltering for Nested Cardinality Constraints: Application to an Energy Cost Aware Production Planning Problem for Tissue Manufacturing -- Cyclic Routing of Unmanned Aerial Vehicles -- Parallelizing Constraint Programming with Learning -- Parallel Composition of Scheduling Solvers -- Rail Capacity Planning With Constraint Programming -- Scheduling Home Hospice Care with Logic-Based Benders Decomposition -- A Global Constraint for Mining Sequential Patterns with GAP Constraint -- A Reservoir Balancing Constraint with Applications to Bike-Sharing -- Optimization Models for a Real-World Snow Plow Routing Problem -- The TASKINTERSECTION Constraint -- A Stochastic Continuous Optimization Backend for MiniZinc with Applications to Geometrical Placement Problems -- Constructions and In-place Operations for MDDs Based Constraints -- Balancing Nursing Workload by Constraint Programming -- Designing Spacecraft Command Loops Using Two-Dimension Vehicle Routing -- Constraint Programming Approach for Spatial Packaging Problem -- Detecting Semantic Groups in MIP Models -- Revisiting Two-Sided Stability Constraints -- Optimal Flood Mitigation over Flood Propagation Approximations -- A Bit-Vector Solver with Word Level Propagation -- A New Solver for the Minimum Weighted Vertex Cover Problem -- Optimal Upgrading Schemes for Eective Shortest Paths in Networks.
Record Nr. UNISA-996465781903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Integration of AI and OR Techniques in Constraint Programming [[electronic resource] ] : 13th International Conference, CPAIOR 2016, Banff, AB, Canada, May 29 - June 1, 2016, Proceedings / / edited by Claude-Guy Quimper
Integration of AI and OR Techniques in Constraint Programming [[electronic resource] ] : 13th International Conference, CPAIOR 2016, Banff, AB, Canada, May 29 - June 1, 2016, Proceedings / / edited by Claude-Guy Quimper
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIX, 421 p. 123 illus.)
Disciplina 005.116
Collana Theoretical Computer Science and General Issues
Soggetto topico Numerical analysis
Computer science—Mathematics
Discrete mathematics
Algorithms
Artificial intelligence
Operations research
Management science
Numerical Analysis
Mathematical Applications in Computer Science
Discrete Mathematics in Computer Science
Artificial Intelligence
Operations Research, Management Science
ISBN 3-319-33954-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On CNF Encodings for Decision Diagrams -- Time-Series Constraints: Improvements and Application in CP and MIP Contexts -- Finding a Collection of MUSes Incrementally -- Decompositions Based on Decision Diagrams -- Logic-Based Decomposition Methods for the Travelling Purchaser Problem -- Lagrangian Decomposition via Subproblem Search -- Non-linear Optimization of Business Models in the Electricity Market -- Weighted Spanning Tree Constraint with Explanations -- Forward-Checking ltering for Nested Cardinality Constraints: Application to an Energy Cost Aware Production Planning Problem for Tissue Manufacturing -- Cyclic Routing of Unmanned Aerial Vehicles -- Parallelizing Constraint Programming with Learning -- Parallel Composition of Scheduling Solvers -- Rail Capacity Planning With Constraint Programming -- Scheduling Home Hospice Care with Logic-Based Benders Decomposition -- A Global Constraint for Mining Sequential Patterns with GAP Constraint -- A Reservoir Balancing Constraint with Applications to Bike-Sharing -- Optimization Models for a Real-World Snow Plow Routing Problem -- The TASKINTERSECTION Constraint -- A Stochastic Continuous Optimization Backend for MiniZinc with Applications to Geometrical Placement Problems -- Constructions and In-place Operations for MDDs Based Constraints -- Balancing Nursing Workload by Constraint Programming -- Designing Spacecraft Command Loops Using Two-Dimension Vehicle Routing -- Constraint Programming Approach for Spatial Packaging Problem -- Detecting Semantic Groups in MIP Models -- Revisiting Two-Sided Stability Constraints -- Optimal Flood Mitigation over Flood Propagation Approximations -- A Bit-Vector Solver with Word Level Propagation -- A New Solver for the Minimum Weighted Vertex Cover Problem -- Optimal Upgrading Schemes for Eective Shortest Paths in Networks.
Record Nr. UNINA-9910483569903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui