- Table View
- List View
Theory of Cryptography
by Tal Malkin Eyal KushilevitzThe two-volume set LNCS 9562 and LNCS 9563 constitutes the refereed proceedings of the 13th International Conference on Theory of Cryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions.
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part II (Lecture Notes in Computer Science #13043)
by Kobbi Nissim Brent WatersThe three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part III (Lecture Notes in Computer Science #13044)
by Kobbi Nissim Brent WatersThe three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I (Lecture Notes in Computer Science #13042)
by Kobbi Nissim Brent WatersThe three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12550)
by Rafael Pass Krzysztof PietrzakThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III (Lecture Notes in Computer Science #12552)
by Rafael Pass Krzysztof PietrzakThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12551)
by Rafael Pass Krzysztof PietrzakThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference on Theory of Cryptography, TCCC 2020, held in Durham, NC, USA, in November 2020. The total of 71 full papers presented in this three-volume set was carefully reviewed and selected from 167 submissions. Amongst others they cover the following topics: study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization; discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones, formulation and treatment of new cryptographic problems; study of notions of security and relations among them; modeling and analysis of cryptographic algorithms; and study of the complexity assumptions used in cryptography. Due to the Corona pandemic this event was held virtually.
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14369)
by Guy Rothblum Hoeteck WeeThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability.
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14370)
by Guy Rothblum Hoeteck WeeThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability.
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14372)
by Guy Rothblum Hoeteck WeeThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability.
Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14371)
by Guy Rothblum Hoeteck WeeThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability.
Theory of Decision under Uncertainty
by Itzhak GilboaThis book describes the classical axiomatic theories of decision under uncertainty, as well as critiques thereof and alternative theories. It focuses on the meaning of probability, discussing some definitions and surveying their scope of applicability. The behavioral definition of subjective probability serves as a way to present the classical theories, culminating in Savage's theorem. The limitations of this result as a definition of probability lead to two directions - first, similar behavioral definitions of more general theories, such as non-additive probabilities and multiple priors, and second, cognitive derivations based on case-based techniques.
Theory of Digital Automata
by Oleksandr Petrov Mykola Karpinskyy Bohdan Borowik Valery LahnoThis book serves a dual purpose: firstly to combine the treatment of circuits and digital electronics, and secondly, to establish a strong connection with the contemporary world of digital systems. The need for this approach arises from the observation that introducing digital electronics through a course in traditional circuit analysis is fast becoming obsolete. Our world has gone digital. Automata theory helps with the design of digital circuits such as parts of computers, telephone systems and control systems. A complete perspective is emphasized, because even the most elegant computer architecture will not function without adequate supporting circuits. The focus is on explaining the real-world implementation of complete digital systems. In doing so, the reader is prepared to immediately begin design and implementation work. This work serves as a bridge to take readers from the theoretical world to the everyday design world where solutions must be complete to be successful.
Theory of Fun for Game Design
by Raph KosterNow in full color, the 10th anniversary edition of this classic book takes you deep into the influences that underlie modern video games, and examines the elements they share with traditional games such as checkers. At the heart of his exploration, veteran game designer Raph Koster takes a close look at the concept of fun and why it’s the most vital element in any game.Why do some games become boring quickly, while others remain fun for years? How do games serve as fundamental and powerful learning tools? Whether you’re a game developer, dedicated gamer, or curious observer, this illustrated, fully updated edition helps you understand what drives this major cultural force, and inspires you to take it further.You’ll discover that:Games play into our innate ability to seek patterns and solve puzzlesMost successful games are built upon the same elementsSlightly more females than males now play gamesMany games still teach primitive survival skillsFictional dressing for modern games is more developed than the conceptual elementsTruly creative designers seldom use other games for inspirationGames are beginning to evolve beyond their prehistoric origins
The Theory of Info-Dynamics: Rational Foundations of Information-Knowledge Dynamics
by Kofi K. DompereThis book focuses on the development of a theory of info-dynamics to support the theory of info-statics in the general theory of information. It establishes the rational foundations of information dynamics and how these foundations relate to the general socio-natural dynamics from the primary to the derived categories in the universal existence and from the potential to the actual in the ontological space. It also shows how these foundations relate to the general socio-natural dynamics from the potential to the possible to give rise to the possibility space with possibilistic thinking; from the possible to the probable to give rise to possibility space with probabilistic thinking; and from the probable to the actual to give rise to the space of knowledge with paradigms of thought in the epistemological space. The theory is developed to explain the general dynamics through various transformations in quality-quantity space in relation to the nature of information flows at each variety transformation. The theory explains the past-present-future connectivity of the evolving information structure in a manner that illuminates the transformation problem and its solution in the never-ending information production within matter-energy space under socio-natural technologies to connect the theory of info-statics, which in turn presents explanations to the transformation problem and its solution. The theoretical framework is developed with analytical tools based on the principle of opposites, systems of actual-potential polarities, negative-positive dualities under different time-structures with the use of category theory, fuzzy paradigm of thought and game theory in the fuzzy-stochastic cost-benefit space. The rational foundations are enhanced with categorial analytics.The value of the theory of info-dynamics is demonstrated in the explanatory and prescriptive structures of the transformations of varieties and categorial varieties at each point of time and over time from parent–offspring sequences. It constitutes a general explanation of dynamics of information-knowledge production through info-processes and info-processors induced by a socio-natural infinite set of technologies in the construction–destruction space.
Theory of Information and its Value
by Ruslan L. StratonovichThis English version of Ruslan L. Stratonovich’s Theory of Information (1975) builds on theory and provides methods, techniques, and concepts toward utilizing critical applications. Unifying theories of information, optimization, and statistical physics, the value of information theory has gained recognition in data science, machine learning, and artificial intelligence. With the emergence of a data-driven economy, progress in machine learning, artificial intelligence algorithms, and increased computational resources, the need for comprehending information is essential. This book is even more relevant today than when it was first published in 1975. It extends the classic work of R.L. Stratonovich, one of the original developers of the symmetrized version of stochastic calculus and filtering theory, to name just two topics.Each chapter begins with basic, fundamental ideas, supported by clear examples; the material then advances to great detail and depth. The reader is not required to be familiar with the more difficult and specific material. Rather, the treasure trove of examples of stochastic processes and problems makes this book accessible to a wide readership of researchers, postgraduates, and undergraduate students in mathematics, engineering, physics and computer science who are specializing in information theory, data analysis, or machine learning.
Theory of JIZAI Body: Towards Mastery Over the Extended Self
by Masahiko InamiThis book proposes a novel body image to bridge gap between self-transformation and preserving sense of self: the Jizai body. Automation and digitization have served to transform our lives. Digital transformation, for example, is rapidly changing the world every day, making life more convenient and comfortable. However, there is a worrying trend of removing the human element from human-centric systems as technologies and algorithms become more capable. Leaving humanity behind, especially its corporal components, will leave persons unable to feel a sense of self in their newfound comfort. Despite the allure of an automated life, it is doubtful that the authors will find happiness without a sense of control. Exploring the essence of what makes us human from a physiological and psychological standpoint, the authors present a new perspective on what constitutes a body in this era where the real physical world and virtual information world coexist. The authors present state-of-the-art research which seeks to free humanity from its physical constraints and allow free control of both the natural and extended body. The next step in human evolution starts here.
Theory of Practical Cellular Automaton
by Xueyan Li Jinpei Wu Xuewei LiThis book addresses the intellectual foundations, function, modeling approaches and complexity of cellular automata; explores cellular automata in combination with genetic algorithms, neural networks and agents; and discusses the applications of cellular automata in economics, traffic and the spread of disease. Pursuing a blended approach between knowledge and philosophy, it assigns equal value to methods and applications.
Theory of Quantum Computation, Communication, and Cryptography
by Dave Bacon Miguel Martin-Delgado Martin RoettelerThis book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2011, held in Madrid, Spain, in May 2011. The 14 revised papers presented were carefully selected from numerous submissions. The papers present new and original research and cover a large range of topics in quantum computation, communication and cryptography, a new and interdisciplinary field at the intersection of computer science, information theory and quantum mechanics.
The Theory of Queuing Systems with Correlated Flows
by Alexander N. Dudin Valentina I. Klimenok Vladimir M. VishnevskyThis book is dedicated to the systematization and development of models, methods, and algorithms for queuing systems with correlated arrivals. After first setting up the basic tools needed for the study of queuing theory, the authors concentrate on complicated systems: multi-server systems with phase type distribution of service time or single-server queues with arbitrary distribution of service time or semi-Markovian service. They pay special attention to practically important retrial queues, tandem queues, and queues with unreliable servers. Mathematical models of networks and queuing systems are widely used for the study and optimization of various technical, physical, economic, industrial, and administrative systems, and this book will be valuable for researchers, graduate students, and practitioners in these domains.
Theory of Science and Technology Transfer and Applications
by Sifeng Liu Zhigeng Fang Hongxing Shi Benhai GuoConstructive Suggestions for Efficiently Implementing Technology Transfer Theory of Science and Technology Transfer and Applications presents the mechanisms, features, effects, and modes of technology transfer. It addresses the measurement, cost, benefit, optimal allocation, and game theory of technology transfer, along with the dynamics of the tec
The Theory of the Moiré Phenomenon
by Isaac AmidrorThis book presents the most comprehensive and methodical work on the theory of the moiré phenomenon, providing a full general-purpose and application-independent exposition of this fascinating effect. Based on the Fourier theory, it leads the reader through the various phenomena which occur in the superposition of repetitive layers, both in the image and in the spectral domains. The first chapters of the book present the basic theory, covering the superposition of monochrome, periodic layers. In later chapters, the theory is extended to the even more interesting cases of polychromatic moirés and moirés between repetitive, non-periodic layers. Throughout the whole text the book favours a pictorial, intuitive approach, which is supported by mathematics, and the discussion is accompanied by a large number of figures and illustrative examples. The prerequisite mathematical background is limited to an elementary familiarity with the Fourier theory.
A Theory of Tutelary Relationships
by Cristiano CastelfranchiThe purpose of the book is to propose and exploit an analytical, critical, well defined theory of a very crucial human social relation that I call “Tutelarity/ Tutelage”. This will thus explain how/why such relation is so relevant at any layer of sociality: from affective relationships, to social cooperation and interactions, to politics and democracy. The approach is theoretical and strongly grounded on cognitive science and the models of human mind: beliefs, desires, expectations, emotions, etc. Written in an accessible way, it will be of interest for a large audience, specifically to researchers and scientists interested in cognitive science and the dynamics of social relationships alike.
Theory of User Engineering
by Masaaki KurosuThis book outlines the new concept of user engineering and covers the diversity of users, along with the business process that includes the design and the user’s experience processes. Although the concept of user experience (UX) has become popular, the definition and the methodology are still ambiguous. User engineering is similar to the user-centered design, but differs in that its scope is not limited to the design process but concerns the whole manufacturing process and the whole usage process, i.e., the whole lifecycle of an artifact. User’s perspective is strongly emphasized in this book, hence, its stance is far from that of the marketing approach that usually fails to notice the life and experiences of users after the purchase of an artifact as consumers. Theory of User Engineering differentiates between the quality in design and the quality in use, and the objective quality characteristics and the subjective quality characteristics. In addition to the user research using ethnographic methods, the author introduces a new approach based on the artifact evolution theory that can be adopted in the planning stage.
Thepurplebook, 2007 Edition: The Definitive Guide to Exceptional Online Shopping
by Hillary Mendelsohn Lawrence Butler Ian AndersonGet out of the mall and on to your computer. With the click of your mouse and the completely updated 2007 edition of thepurplebook[Registered], you've got a 24-7 invitation to window-shop at over 1,600 of the Internet's best sites (including hundreds of newly discovered Web retailers). This user-friendly, thoroughly researched guide unlocks the true potential of online shopping by showing you first-rate places to find the products you seek and uncovering incredible sites you never dreamed existed, whether you want to express your personal style, find the perfect gift, or simply make life a little more convenient. From functional to fabulous, trendsetter to traditional, bargain basement to designer luxe, you'll find something to fit every taste, style, and budget. Shop till you drop with: Outstanding quality--more than 40,000 sites were screened for the book, and each one that made the cut promises a do-not-miss experience for the savvy shopper! Helpful consumer tips-advice for avoiding fraudulent charges, identity theft, spam, and other rip-offs, Customer service telephone numbers-the notoriously hard-to-find number that puts you in direct contact with a service representative. Thepurplebook makes it easy to find the right something for yourself and everyone on your shopping list, in each of these essential categories: Art & Collectibles, Crafts & Hobbies, Entertainment, Epicurean, Gadgets & Electronics, Health & Beauty, Home & Garden, Lifestyles & Megastores, Maternity, Men's Apparel, Minors, Pets, Seniors, Shoes & Accessories, Sports & Gifts, Travel, Women's Apparel, Charity.