Browse Results

Showing 36,151 through 36,175 of 54,361 results

Physical Geodesy: A Theoretical Introduction (Springer Textbooks in Earth Sciences, Geography and Environment)

by Jun-Yi Guo

This textbook introduces physical geodesy. It treats the boundary-value theories of the discipline comprehensively, and provides insights to the theory of gravity reduction based on a spherical Earth model. This book is for students who wish to thoroughly understand the material and to expand their knowledge and skills in mathematics for more advanced study and research in this discipline. The details of mathematical derivations included are a useful asset for instructors and researchers.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14440)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VI (Lecture Notes in Computer Science #14443)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14441)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VII (Lecture Notes in Computer Science #14444)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part V (Lecture Notes in Computer Science #14442)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VIII (Lecture Notes in Computer Science #14445)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14438)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14439)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

IRC-SET 2021: Proceedings of the 7th IRC Conference on Science, Engineering and Technology, August 2021, Singapore

by Huaqun Guo Hongliang Ren Victor Wang Eyasu Getahun Chekole Umayal Lakshmanan

This book highlights contemporary state of research in multidisciplinary areas in computer science, computer engineering, chemical engineering, mechanical engineering, physics, biomedical sciences, life sciences, medicine, and health care. The accepted submissions to the 7th IRC Conference on Science, Engineering and Technology (IRC-SET 2021) that were presented on August 7, 2021, are published in this conference proceedings. The papers presented here were shortlisted after extensive rounds of rigorous reviews by a panel of esteemed individuals who are pioneers and experts in their respective domains.

IRC-SET 2020: Proceedings of the 6th IRC Conference on Science, Engineering and Technology, July 2020, Singapore

by Huaqun Guo Hongliang Ren Noori Kim

This book highlights leading-edge research in multi-disciplinary areas in Physics, Engineering, Medicine, and Health care, from the 6th IRC Conference on Science, Engineering and Technology (IRC-SET 2020) held in July 2020 at Singapore. The papers were shortlisted after extensive rounds of reviews by a panel of esteemed individuals who are pioneers in their domains. The book also contains excerpts of the speeches by eminent personalities who graced the occasion, thereby providing written documentation of the event.

IRC-SET 2022: Proceedings of the 8th IRC Conference on Science, Engineering and Technology, August 2022, Singapore

by Huaqun Guo Ian McLoughlin Eyasu Getahun Chekole Umayal Lakshmanan Weizhi Meng Peng Cheng Wang Jiqiang Lu

This book highlights contemporary state of research in multi-disciplinary areas in Physics, Biomedical Sciences, Chemical Engineering, Mechanical Engineering, Computer Science/Engineering, Life Sciences, and Healthcare. The accepted submissions to the 8th IRC Conference on Science, Engineering and Technology (IRC-SET 2022) that were presented on 6th August 2022, are published in this conference proceedings. The papers presented here were shortlisted after extensive rounds of rigorous reviews by a panel of esteemed individuals who are pioneers and experts in their respective domains.

Introduction to Space Archaeology

by Huadong Guo Xinyuan Wang Fulong Chen Cheng Wang

This book presents the basic principles and the latest advances in space archaeology. Following general reviews of the state of the art of Earth observation technologies and archaeology, the book introduces the principles and methods of space archaeology, remote sensing methods for archaeological survey, and integrated archaeological survey methods including geophysics, virtual reality, web technologies, global positioning systems (GPS), geographical information systems (GIS), and big data. The book then presents two chapters on case studies of word heritage sites in Asia, Europe, Africa, and Americas, including three major world heritage sites in China: The Great Wall, Grand Canal, and Silk Road. The last chapter of the book discusses the future of space archaeology. This book has an interdisciplinary appeal and scholars with an interest in cultural heritage and remote sensing technologies for Earth value its contribution.

Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11449)

by Fuchun Guo Xinyi Huang Moti Yung

This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.

Data Center Networking: Network Topologies and Traffic Management in Large-Scale Data Centers

by Deke Guo

This book provides a comprehensive reference in large data center networking. It first summarizes the developing trend of DCNs, and reports four novel DCNs, including a switch-centric DCN, a modular DCN, a wireless DCN, and a hybrid DCN. Furthermore another important factor in DCN targets at managing and optimizing the network activity at the level of transfers to aggregate correlated data flows and thus directly to lower down the network traffic resulting from such data transfers. In particular, the book reports the in-network aggregation of incast transfer, shuffle transfer, uncertain incast transfer, and the cooperative scheduling of uncertain multicast transfer.

Material Appearance Modeling: A Data-Coherent Approach

by Baining Guo Yue Dong Stephen Lin

A principal aim of computer graphics is to generate images that look as real as photographs. Realistic computer graphics imagery has however proven to be quite challenging to produce, since the appearance of materials arises from complicated physical processes that are difficult to analytically model and simulate, and image-based modeling of real material samples is often impractical due to the high-dimensional space of appearance data that needs to be acquired. This book presents a general framework based on the inherent coherency in the appearance data of materials to make image-based appearance modeling more tractable. We observe that this coherence manifests itself as low-dimensional structure in the appearance data, and by identifying this structure we can take advantage of it to simplify the major processes in the appearance modeling pipeline. This framework consists of two key components, namely the coherence structure and the accompanying reconstruction method to fully recover the low-dimensional appearance data from sparse measurements. Our investigation of appearance coherency has led to three major forms of low-dimensional coherence structure and three types of coherency-based reconstruction upon which our framework is built. This coherence-based approach can be comprehensively applied to all the major elements of image-based appearance modeling, from data acquisition of real material samples to user-assisted modeling from a photograph, from synthesis of volumes to editing of material properties, and from efficient rendering algorithms to physical fabrication of objects. In this book we present several techniques built on this coherency framework to handle various appearance modeling tasks both for surface reflections and subsurface scattering, the two primary physical components that generate material appearance. We believe that coherency-based appearance modeling will make it easier and more feasible for practitioners to bring computer graphics imagery to life. This book is aimed towards readers with an interest in computer graphics. In particular, researchers, practitioners and students will benefit from this book by learning about the underlying coherence in appearance structure and how it can be utilized to improve appearance modeling. The specific techniques presented in our manuscript can be of value to anyone who wishes to elevate the realism of their computer graphics imagery. For understanding this book, an elementary background in computer graphics is assumed, such as from an introductory college course or from practical experience with computer graphics.

Internet der Dinge in der Intralogistik

by Willibald Günthner Michael Ten Hompel

Experten aus Wissenschaft und Technik fordern ein Umdenken in der Intralogistik: weg von durchgeplanten, vorherbestimmten Systemen, hin zu einem Netzwerk gleichberechtigter Einheiten, die keiner übergeordneten Koordination bedürfen. In dem Band werden die notwendigen Komponenten, die Softwarearchitektur und die Potenziale dieser neuen Technologie beschrieben. Anwendungsbeispiele liefern Entwicklern und Planern eine Grundlage für die Gestaltung moderner Materialflusssysteme in der Industrie.

Optimized C++: Proven Techniques for Heightened Performance

by Kurt Guntheroth

In today's fast and competitive world, a program's performance is just as important to customers as the features it provides. This practical guide teaches developers performance-tuning principles that enable optimization in C++. You'll learn how to make code that already embodies best practices of C++ design run faster and consume fewer resources on any computer--whether it's a watch, phone, workstation, supercomputer, or globe-spanning network of servers.Author Kurt Guntheroth provides several running examples that demonstrate how to apply these principles incrementally to improve existing code so it meets customer requirements for responsiveness and throughput. The advice in this book will prove itself the first time you hear a colleague exclaim, "Wow, that was fast. Who fixed something?"Locate performance hot spots using the profiler and software timersLearn to perform repeatable experiments to measure performance of code changesOptimize use of dynamically allocated variablesImprove performance of hot loops and functionsSpeed up string handling functionsRecognize efficient algorithms and optimization patternsLearn the strengths--and weaknesses--of C++ container classesView searching and sorting through an optimizer's eyeMake efficient use of C++ streaming I/O functionsUse C++ thread-based concurrency features effectively

GIMP für Dummies (Für Dummies)

by Karsten W. Günther

Dieses Buch befasst sich mit den Grundlagen der Bildbearbeitung und von GIMP: Docks, Werkzeuge, Filter, Auswahlen, Ebenen und Pfade werden Ihnen bald sehr vertraut sein. Sie wollen Bilder verbessern und kombinieren oder gar neue Bilder erzeugen? Mit GIMP kein Problem. Sie sind sicher, dass GIMP eine bestimmte Funktionalität hat, wissen aber nicht, wo suchen? Schlagen Sie in diesem Buch nach! Für Fortgeschrittene bietet es zudem noch jede Menge Tipps zu Spezialeffekten, zum zerstörungsfreien Arbeiten, zum Schärfen und Weichzeichnen und zu vielen anderen Dingen, die bei der Bildbearbeitung Spaß machen.

Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings (Lecture Notes in Computer Science #13895)

by Felix Günther Julia Hesse

This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..

Laptops Simplified

by Sherry Kinkoph Gunter

Step-by-step guidance on all things laptop-related, aimed at visual learnersA little overwhelmed by the selection of laptops out there and how to get started using one? Laptops Simplified, Second Edition is here to help! Boasting a straightforward, jargon-free approach, this easy-to-navigate guide takes the fear out of exploring the subject of laptops and breaks it down to the basics. Veteran author Sherry Kinkoph Gunter demystifies common laptop issues such as finding the laptop that is right for you, setting it up, troubleshooting it, and maintaining it. Covers the very basics of connecting to wireless networks while away from home; working with a variety of devices such as cameras, cell phones, and extra monitors; and making sure all security precautions are in place for safe online experiencesFeatures full-color screen shots and numbered, step-by-step instructions on how to get up and running with your laptopIncludes coverage of the new Windows 8 operating systemShares helpful advice from a veteran author on getting the most out of your laptopLaptops Simplified, Second Edition puts you on your way to becoming a confident and savvy laptop user!

Office 2010 Visual Quick Tips

by Sherry Kinkoph Gunter

Get more done in Office 2010 in less time with these Quick Tips!Whether you're new to Microsoft Office or updating from older versions, this is the perfect resource to get you quickly up to speed on Office 2010. Every application is covered, including Word, Excel, PowerPoint, Outlook, and Publisher. Full-color screenshots and numbered steps clearly explain dozens of features and functions-while quick shortcuts, tips, and tricks help you save time and boost productivity. You'll also find great new ways to access and use some Office apps right from the Web.Walks you through dozens of new features and functions of Microsoft Office 2010Covers Word, Excel, PowerPoint, Outlook, and PublisherUses straightforward descriptions and explanations, full-color screenshots, and easy-to-follow numbered steps to help you glean what you need, fastBoosts your productivity with shortcuts, tips, and tricks that help you work smarter and fasterPut Office 2010 to work for you in no time with the invaluable quick tips in Office 2010 Visual Quick Tips.

Teach Yourself VISUALLY Flash CS3 Professional

by Sherry Kinkoph Gunter

Clear, step-by-step screen shots arranged in two-page lessons show you how to tackle more than 140 Flash CS3 Professional tasks. No long-winded explanations, just easy, visual directions for performing such necessary operations as creating objects, symbols, and instances; controlling playback with the Timeline; adding interactivity with buttons; organizing project assets with the Library; creating animation with tweens; and adding sound and video . Helpful sidebars offer practical tips and tricks, and it's all presented for the visual learner.

Teach Yourself VISUALLY Laptops

by Sherry Kinkoph Gunter

The fast and easy way to learn about buying, maintaining, and troubleshooting, a laptopHow do I find the right laptop for me? Now that I have a laptop, how do I set it up and maintain it? What are some tips for getting the most out of software systems? How do I begin to troubleshoot my laptop? If you are a visual learner and have ever asked yourself any of those questions, then this is just the book you need. Visual, step-by-step guidance walks you through finding the right laptop to meet your needs, getting comfortable with the latest versions of Windows and the Microsoft Office Suite, and understanding the most important security aspects of keeping your online experiences safe.Helps visual learners get comfortable and confident with their laptopsFeatures full-color screen shots and numbered, step-by-step instructions on how to get up and running Walks you through using the latest hardware add-ons, the Internet, and popular software applicationsTeach Yourself VISUALLY Laptops, Second Edition offers you an easy-to-follow and visually appealing way to learn!

Teachers Discovering Computers: Integrating Technology in a Changing World

by Glenda A. Gunter Randolph E. Gunter

TEACHERS DISCOVERING COMPUTERS: INTEGRATING TECHNOLOGY IN A CHANGING WORLD, EIGHTH EDITION introduces future educators to technology and digital media in order to help them successfully teach the current generation of digital students.

Refine Search

Showing 36,151 through 36,175 of 54,361 results