Research and information: general > Information theory

Vis mig kun

Smart Networks

Smart Networks

Hyvarinen, Jenni

875,33 DKK

Trust Management II

Trust Management II

Jensen, Christian Damsgaard

875,33 DKK

Data Compression

Data Compression

Salomon, David

692,63 DKK

High Performance Networking

High Performance Networking

As, Harmen R. van

2190,77 DKK

Database Security XII

Database Security XII

Jajodia, Sushil

1240,73 DKK

Research Advances in Database and Information Systems Security

Research Advances in Database and Information Systems Security

Hale, John

875,33 DKK

Video on Demand Systems

Video on Demand Systems

Pavlik, John V.

875,33 DKK

Multimedia Technologies and Applications for the 21st Century

Multimedia Technologies and Applications for the 21st Century

Furht, Borko

2190,77 DKK

Advances in Cryptology - CRYPTO '88

Advances in Cryptology - CRYPTO '88

Goldwasser, Shafi

436,85 DKK

Communication And The Transformation Of Economics

Communication And The Transformation Of Economics

Babe, Robert E

329,95 DKK

Advances in Information Processing and Protection

Advances in Information Processing and Protection

Saeed, Khalid

2190,77 DKK

Database Performance Tuning and Optimization

Database Performance Tuning and Optimization

Mittra, Sitansu S.

436,85 DKK

Precoding Techniques for Digital Communication Systems

Precoding Techniques for Digital Communication Systems

Chang, Yu-Hao

875,33 DKK

Databases and Mobile Computing

Databases and Mobile Computing

Krishnakumar, N.

875,33 DKK

Database and Application Security XV

Database and Application Security XV

Spooner, David L.

875,33 DKK

Advanced Communications and Multimedia Security

Advanced Communications and Multimedia Security

Klobucar, Tomaz

875,33 DKK

Telecommunication Network Intelligence

Telecommunication Network Intelligence

As, Harmen R. van

2190,77 DKK

Knowledge and Data Management in GRIDs

Knowledge and Data Management in GRIDs

Dikaiakos, Marios D.

948,41 DKK

Introduction to Constraint Databases

Introduction to Constraint Databases

Revesz, Peter

436,85 DKK

Policies and Research in Identity Management

Policies and Research in Identity Management

Borking, John

436,85 DKK

Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking

Socek, Daniel

1240,73 DKK

Biometric User Authentication for IT Security

Biometric User Authentication for IT Security

Vielhauer, Claus

875,33 DKK

Cryptographic Security Architecture

Cryptographic Security Architecture

Gutmann, Peter

875,33 DKK

Cryptographic Algorithms on Reconfigurable Hardware

Cryptographic Algorithms on Reconfigurable Hardware

Koc, Cetin Kaya

1021,49 DKK

Human Identification Based on Gait

Human Identification Based on Gait

Chellappa, Rama

875,33 DKK

Theory of Information and Coding

Theory of Information and Coding

McEliece, Robert

1313,81 DKK

Digital Signatures

Digital Signatures

Katz, Jonathan

875,33 DKK

Large Deviations For Performance Analysis

Large Deviations For Performance Analysis

Shwartz, Adam

403,64 DKK

Malware Detection

Malware Detection

Wang, Cliff

2921,57 DKK

Communication Systems

Communication Systems

Rocha, Valdemar C. da

436,85 DKK