hal. 694-706
hal. 541-562
hal. 694-706
hal. 533-543
Executive Summary -- General Introduction and Main Conclusions -- General Introduction -- Basic Notions and General Conclusions -- Synopsis -- Empirical and Theoretical Chapters -- Citation Analysis of Basic Science Research Departments -- Citation Analysis of Scientific Journals -- Basic Principles, Citation Links and Terminology -- ISI Coverage by Discipline -- Implications for the Use of the…
Workshop Report for the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004) -- Workshop Report for the 3rd International Workshop on Peer-to-Peer Systems (IPTPS 2004) -- I Miscellaneous -- A Practical Distributed Mutual Exclusion Protocol in Dynamic Peer-to-Peer Systems -- On the Cost of Participating in a Peer-to-Peer Network -- 2 P2P or Not 2 P2P? -- II Networking -- On Transport …
This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, provid…
Part I Deterministic Methods and Procedures. Spectral Analysis of Finite Dimensional Operators. Finite Element Method. Non-Linear Static Analysis. Dynamic Analysis -- Part II Probabilistic Methods and Procedures. Rational Treatment of Uncertainties. Karhunen-Loève Expansion. Direct Monte Carlo Simulation. Equivalent Statistical Linearization. Random Vibrations of Large Finite Element Systems -…
General Security Issues -- IT Security Development -- A Case for Public and Private Review of Developing it Security Standards -- Assuring Critical Information Infrastructure -- Systemic Challenges for Critical Information Infrastructure Protection -- Decentralized Energy Supply to Secure Computer Systems -- Dependability -- Safety Analysis Methods—Software Development Questions -- Trust Case…