Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Current Law
  • Language: en
  • Pages: 682

Current Law

  • Categories: Law
  • Type: Book
  • -
  • Published: 2009-04-16
  • -
  • Publisher: Unknown

The perfect combination - these two books together form a complete suite of upstream oil and gas agreements.

Networking And Mobile Computing
  • Language: en
  • Pages: 1321

Networking And Mobile Computing

Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are currently witnessing a proliferation in mobile/wireless technologies and applications. However, these new technologies have ushered in unprecedented challenges for the research community across the range of networking, mobile computing, network security and wireless web applications, and optical network topics. ICCNMC 2005 was sponsored by the China Computer Federation, in cooperation with the Institute for Electrical and Electronics Engineers (IEEE) Computer Society. The objective of this conference was to address and capture highly innovative and stateof-the-art resear...

Computer, Informatics, Cybernetics and Applications
  • Language: en
  • Pages: 1613

Computer, Informatics, Cybernetics and Applications

The Conference on Computer, Informatics, Cybernetics and Applications 2011 aims to facilitate an exchange of information on best practices for the latest research advances in the area of computer, informatics, cybernetics and applications, which mainly includes computer science and engineering, informatics, cybernetics, control systems, communication and network systems, technologies and applications, others and emerging new topics.

Information Security and Cryptology
  • Language: en
  • Pages: 431

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2005-12-02
  • -
  • Publisher: Springer

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and appli...

Official Gazette of the United States Patent and Trademark Office
  • Language: en
  • Pages: 1418

Official Gazette of the United States Patent and Trademark Office

  • Type: Book
  • -
  • Published: 2004
  • -
  • Publisher: Unknown

description not available right now.

Green Communications and Networks
  • Language: en
  • Pages: 1547

Green Communications and Networks

The objective of GCN 2011 is to facilitate an exchange of information on best practices for the latest research advances in the area of green communications and networks, which mainly includes the intelligent control, or efficient management, or optimal design of access network infrastructures, home networks, terminal equipment, and etc. Topics of interests include network design methodology, enabling technologies, network components and devices, applications, others and emerging new topics.

Testing Extreme Programming
  • Language: en
  • Pages: 332

Testing Extreme Programming

Testing is a cornerstone of XP, as tests are written for every piece of code before it is programmed. This workbook helps testers learn XP, and XP devotees learn testing. This new book defines how an XP tester can optimally contribute to a project, including what testers should do, when they should do it, and how they should do it.

Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications
  • Language: en
  • Pages: 660

Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

  • Type: Book
  • -
  • Published: 2017-03-02
  • -
  • Publisher: Springer

The book is a collection of high-quality peer-reviewed research papers presented at International Conference on Frontiers of Intelligent Computing: Theory and applications (FICTA 2016) held at School of Computer Engineering, KIIT University, Bhubaneswar, India during 16 - 17 September 2016. The book aims to present theories, methodologies, new ideas, experiences, applications in all areas of intelligent computing and its applications to various engineering disciplines like computer science, electronics, electrical, mechanical engineering, etc.

Identity-Based Encryption
  • Language: en
  • Pages: 187

Identity-Based Encryption

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Official Gazette of the United States Patent and Trademark Office
  • Language: en
  • Pages: 1480

Official Gazette of the United States Patent and Trademark Office

  • Type: Book
  • -
  • Published: 2001
  • -
  • Publisher: Unknown

description not available right now.