Sprache: Englisch
Verlag: Berlin ; Heidelberg [u.a.] : Springer, 1986
ISBN 10: 3540167617 ISBN 13: 9783540167617
Anbieter: books4less (Versandantiquariat Petra Gros GmbH & Co. KG), Welling, Deutschland
Broschiert. Zustand: Gut. 473 Seiten; Das hier angebotene Buch stammt aus einer teilaufgelösten wissenschaftlichen Bibliothek und trägt die entsprechenden Kennzeichnungen (Rückenschild, Instituts-Stempel.); leichte altersbedingte Anbräunung des Papiers; der Buchzustand ist ansonsten ordentlich und dem Alter entsprechend gut. In ENGLISCHER Sprache. Sprache: Englisch Gewicht in Gramm: 790.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 57,16
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Zustand: New. pp. 488.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Characterizations of PUNC and precomputation.- Comparison of algorithms controlling concurrent access to a database: A combinatorial approach.- A new duality result concerning Voronoi diagrams.- Classification of all the minimal bilinear algorithms for computing the coefficients of the product of two polynomials modulo a polynomial.- On exponential lowness.- A tradeoff between search and update time for the implicit dictionary problem.- Intersections of some families of languages.- Correspondence between ternary simulation and binary race analysis in gate networks.- Counting with rational functions.- Finite biprefix sets of paths in a Graph.- Parallel RAMs with owned global memory and deterministic context-free language recognition.- A Strong restriction of the inductive completion procedure.- On discerning words by automata.- Complexity classes without machines: On complete languages for UP.- Containment, separation, complete sets, and immunity of complexity classes.- On nontermination of Knuth-Bendix algorithm.- Tradeoffs for language recognition on parallel computing models.- Rational equivalence relations.- Some further results on digital search trees.- Knowledge, belief and time.- A termination detector for static and dynamic distributed systems with asynchronous non-first-in-first-out communication.- Decompositions of nondeterministic reductions.- Hierarchical planarity testing algorithms.- Synthesis and equivalence of concurrent systems.- The set union problem with backtracking.- Torsion matrix semigroups and recognizable transductions.- On recognizable subsets of free partially commutative monoids.- Min Cut is NP-complete for edge weighted trees.- Alternating automata, the weak monadic theory of the tree, and its complexity.- Subpolynomial complexity classes ofreal functions and real numbers.- Etude syntaxique des parties reconnaissables de mots infinis.- Refusal testing.- A timed model for communicating sequential processes.- A uniform reduction theorem extending a result of J. Grollmann and A. Selman.- On the complexity of deciding fair termination of probabilistic concurrent finite-state programs.- A new approach to detection of locally indicative stability.- A more efficient algorithm for lattice basis reduction.- Lower bounds by recursion theoretic arguments.- An improved algorithm for transitive closure on acyclic digraphs.- Un algorithme determinant les melanges de deux mots.- A very fast, practical algorithm for finding a negative cycle in a digraph.- A compositional reformulation of Owicki-Gries's partial correctness logic for a concurrent while language.- Semigroups and languages of dot-depth 2.- A parallel vertex insertion algorithm for minimum spanning trees.- More complicated questions about maxima and minima, and some closures of NP.- Lower bounds for dynamic range query problems that permit subtraction (extended abstract).- E-unification algorithms for a class of confluent term rewriting systems.- On fixed-point clones.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Automata, Languages and Programming | 13th International Colloquium, Rennes, France, July 15-19, 1986. Proceedings | Laurent Kott | Taschenbuch | xii | Englisch | 1986 | Springer | EAN 9783540167617 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Zustand: As New. Unread book in perfect condition.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 150,84
Anzahl: 3 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 162,96
Anzahl: 3 verfügbar
In den WarenkorbZustand: New.
EUR 143,79
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. CHARLES A. KAMHOUA, PHD, is a Senior Electronics Engineer at the U.S. Army Research Laboratory s Network Security Branch.LAURENT L. NJILLA, PHD, is a researcher at the U.S. Army Research Laboratory s Information Directorate/Cyber Assurance Branch.ALEXANDER .
Zustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 190,18
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 600 pages. 9.25x6.00x1.50 inches. In Stock.
Buch. Zustand: Neu. Neuware - An essential guide to the modeling and design techniques for securing systems that utilize the Internet of ThingsModeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors--noted experts on the topic--also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential.The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book:\* Presents information on game-theory analysis of cyber deception\* Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation\* Contains contributions from an international panel of experts\* Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart citiesWritten for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg Jun 1986, 1986
ISBN 10: 3540167617 ISBN 13: 9783540167617
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Characterizations of PUNC and precomputation.- Comparison of algorithms controlling concurrent access to a database: A combinatorial approach.- A new duality result concerning Voronoi diagrams.- Classification of all the minimal bilinear algorithms for computing the coefficients of the product of two polynomials modulo a polynomial.- On exponential lowness.- A tradeoff between search and update time for the implicit dictionary problem.- Intersections of some families of languages.- Correspondence between ternary simulation and binary race analysis in gate networks.- Counting with rational functions.- Finite biprefix sets of paths in a Graph.- Parallel RAMs with owned global memory and deterministic context-free language recognition.- A Strong restriction of the inductive completion procedure.- On discerning words by automata.- Complexity classes without machines: On complete languages for UP.- Containment, separation, complete sets, and immunity of complexity classes.- On nontermination of Knuth-Bendix algorithm.- Tradeoffs for language recognition on parallel computing models.- Rational equivalence relations.- Some further results on digital search trees.- Knowledge, belief and time.- A termination detector for static and dynamic distributed systems with asynchronous non-first-in-first-out communication.- Decompositions of nondeterministic reductions.- Hierarchical planarity testing algorithms.- Synthesis and equivalence of concurrent systems.- The set union problem with backtracking.- Torsion matrix semigroups and recognizable transductions.- On recognizable subsets of free partially commutative monoids.- Min Cut is NP-complete for edge weighted trees.- Alternating automata, the weak monadic theory of the tree, and its complexity.- Subpolynomial complexity classes of real functions and real numbers.- Etude syntaxique des parties reconnaissables de mots infinis.- Refusal testing.- A timed model for communicating sequential processes.- A uniform reduction theorem extending a result of J. Grollmann and A. Selman.- On the complexity of deciding fair termination of probabilistic concurrent finite-state programs.- A new approach to detection of locally indicative stability.- A more efficient algorithm for lattice basis reduction.- Lower bounds by recursion theoretic arguments.- An improved algorithm for transitive closure on acyclic digraphs.- Un algorithme determinant les melanges de deux mots.- A very fast, practical algorithm for finding a negative cycle in a digraph.- A compositional reformulation of Owicki-Gries's partial correctness logic for a concurrent while language.- Semigroups and languages of dot-depth 2.- A parallel vertex insertion algorithm for minimum spanning trees.- More complicated questions about maxima and minima, and some closures of NP.- Lower bounds for dynamic range query problems that permit subtraction (extended abstract).- E-unification algorithms for a class of confluent term rewriting systems.- On fixed-point clones. 488 pp. Englisch.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND pp. 488.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 77,04
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. Print on Demand pp. 488 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 1986
ISBN 10: 3540167617 ISBN 13: 9783540167617
Anbieter: moluna, Greven, Deutschland
EUR 45,74
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Characterizations of PUNC and precomputation.- Comparison of algorithms controlling concurrent access to a database: A combinatorial approach.- A new duality result concerning Voronoi diagrams.- Classification of all the minimal bilinear algorithms for comp.
Sprache: Englisch
Verlag: Springer, Springer Jun 1986, 1986
ISBN 10: 3540167617 ISBN 13: 9783540167617
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Characterizations of PUNC and precomputation.- Comparison of algorithms controlling concurrent access to a database: A combinatorial approach.- A new duality result concerning Voronoi diagrams.- Classification of all the minimal bilinear algorithms for computing the coefficients of the product of two polynomials modulo a polynomial.- On exponential lowness.- A tradeoff between search and update time for the implicit dictionary problem.- Intersections of some families of languages.- Correspondence between ternary simulation and binary race analysis in gate networks.- Counting with rational functions.- Finite biprefix sets of paths in a Graph.- Parallel RAMs with owned global memory and deterministic context-free language recognition.- A Strong restriction of the inductive completion procedure.- On discerning words by automata.- Complexity classes without machines: On complete languages for UP.- Containment, separation, complete sets, and immunity of complexity classes.- On nontermination of Knuth-Bendix algorithm.- Tradeoffs for language recognition on parallel computing models.- Rational equivalence relations.- Some further results on digital search trees.- Knowledge, belief and time.- A termination detector for static and dynamic distributed systems with asynchronous non-first-in-first-out communication.- Decompositions of nondeterministic reductions.- Hierarchical planarity testing algorithms.- Synthesis and equivalence of concurrent systems.- The set union problem with backtracking.- Torsion matrix semigroups and recognizable transductions.- On recognizable subsets of free partially commutative monoids.- Min Cut is NP-complete for edge weighted trees.- Alternating automata, the weak monadic theory of the tree, and its complexity.- Subpolynomial complexity classes ofreal functions and real numbers.- Etude syntaxique des parties reconnaissables de mots infinis.- Refusal testing.- A timed model for communicating sequential processes.- A uniform reduction theorem extending a result of J. Grollmann and A. Selman.- On the complexity of deciding fair termination of probabilistic concurrent finite-state programs.- A new approach to detection of locally indicative stability.- A more efficient algorithm for lattice basis reduction.- Lower bounds by recursion theoretic arguments.- An improved algorithm for transitive closure on acyclic digraphs.- Un algorithme determinant les melanges de deux mots.- A very fast, practical algorithm for finding a negative cycle in a digraph.- A compositional reformulation of Owicki-Gries's partial correctness logic for a concurrent while language.- Semigroups and languages of dot-depth 2.- A parallel vertex insertion algorithm for minimum spanning trees.- More complicated questions about maxima and minima, and some closures of NP.- Lower bounds for dynamic range query problems that permit subtraction (extended abstract).- E-unification algorithms for a class of confluent term rewriting systems.- On fixed-point clones.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 488 pp. Englisch.
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 174,51
Anzahl: Mehr als 20 verfügbar
In den WarenkorbHardback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Sprache: Englisch
Verlag: John Wiley & Sons Inc, Hoboken, 2020
ISBN 10: 1119593360 ISBN 13: 9781119593362
Anbieter: CitiRetail, Stevenage, Vereinigtes Königreich
EUR 162,97
Anzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: new. Hardcover. An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributorsnoted experts on the topicalso include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deceptionIncludes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generationContains contributions from an international panel of expertsAddresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.