Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: (("secularity" OR "peculiarity") OR "security")
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"518 - Numerical analysis"
Search alternatives
:
"secularity" »
"regularity"
,
"secularism"
"peculiarity" »
"peculiarly"
,
"peculiarities"
Showing
1
-
20
of
87
Search:
'(("secularity" OR "peculiarity") OR "security")'
,
query time: 0.19s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Introduction to Reliable and
Secure
Distributed Programming
by
Cachin, Christian
,
Guerraoui, Rachid
,
Rodrigues, Luís
Published 2011
Springer Berlin Heidelberg
“
... challenge when developing reliable and
secure
distributed programs is to support the cooperation...
”
Read Now
2
Wireless Algorithms, Systems, and Applications : 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings
Published 2018
Springer International Publishing
Table of Contents:
“
...
Security
Framework for Covering KRACK Attacks -- Node Deployment of High Altitude Platform Based Ocean...
”
Read Now
3
Algorithmic Bias: Verzerrungen durch Algorithmen verstehen und verhindern : Ein Leitfaden für Entscheider und Data Scientists
by
Bär, Tobias
Published 2022
Springer Berlin Heidelberg
Subjects:
“
...Data and Information
Security
...
”
Read Now
4
Algorithms and Architectures for Parallel Processing : ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings
Published 2018
Springer International Publishing
Subjects:
“
...Data and Information
Security
...
”
Read Now
5
Algorithms and Architectures for Parallel Processing : 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2–4, 2020, Proceedings, Part III
Published 2020
Springer International Publishing
Table of Contents:
“
... Consensus Mechanisms and Their Applications in IoT: A Literature Survey -- Towards A
secure
Communication...
”
Read Now
6
Guaranteed Accuracy in Numerical Linear Algebra
by
Godunov, S.K.
,
Antonov, A.G.
,
Kiriljuk, O.P.
,
Kostin, V.I.
Published 1993
Springer Netherlands
Table of Contents:
“
... Matrices -- 4 Sturm Sequences of Tridiagonal Matrices -- 5
Peculiarities
of Computer Computations...
”
Read Now
7
Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday
Published 2013
Springer Berlin Heidelberg
Table of Contents:
“
... -- Hardware
Security
-- Privacy and
Security
-- Application
Security
...
”
Read Now
8
Algorithms and Architectures for Parallel Processing : ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings
Published 2015
Springer International Publishing
Table of Contents:
“
...Trust,
security
and privacy for Big Data -- Trust,
security
and privacy for emerging applications...
”
Read Now
9
Iteration Theory and its Functional Equations : Proceedings of the International Symposium held at Schloß Hofen (Lochau), Austria, September 28 - October 1, 1984
Published 1985
Springer Berlin Heidelberg
Table of Contents:
“
... connected with
peculiar
curves -- Iteration and analytic classification of local diffeomorphisms...
”
Read Now
10
Algorithms and Architectures for Parallel Processing : 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings
Published 2017
Springer International Publishing
Table of Contents:
“
... -- Applications of parallel and distributed computing -- Service dependability and
security
in distributed...
”
Read Now
11
Combinatorial Optimization and Applications : 12th International Conference, COCOA 2018, Atlanta, GA, USA, December 15-17, 2018, Proceedings
Published 2018
Springer International Publishing
Table of Contents:
“
...Graph Theory -- Network Flow and
Security
-- Combinatorial Optimization -- Computational Geometry...
”
Read Now
12
Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV
Published 2018
Springer International Publishing
Table of Contents:
“
... Processing -- Internet of Things and Cloud Computing --
Security
and Privacy in Computing...
”
Read Now
13
Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part III
Published 2018
Springer International Publishing
Table of Contents:
“
... Processing -- Internet of Things and Cloud Computing --
Security
and Privacy in Computing...
”
Read Now
14
Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part I
Published 2018
Springer International Publishing
Table of Contents:
“
... Processing -- Internet of Things and Cloud Computing --
Security
and Privacy in Computing...
”
Read Now
15
Algorithms and Architectures for Parallel Processing : 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part II
Published 2018
Springer International Publishing
Table of Contents:
“
... Processing -- Internet of Things and Cloud Computing --
Security
and Privacy in Computing...
”
Read Now
16
Advances in Swarm Intelligence : 4th International Conference, ICSI 2013, Harbin, China, June 12-15, 2013, Proceedings, Part II
Published 2013
Springer Berlin Heidelberg
Table of Contents:
“
... Methods -- System and Information
Security
-- Intelligent Control -- Wireless Sensor Network -- Scheduling...
”
Read Now
17
Algorithms and Architectures for Parallel Processing : 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II
Published 2014
Springer International Publishing
Table of Contents:
“
... in ITS 2014 -- Workshop on
Security
and Privacy in Computer and Network Systems, SPCNS 2014...
”
Read Now
18
Random Numbers and Computers
by
Kneusel, Ronald T.
Published 2018
Springer International Publishing
Table of Contents:
“
... Cryptographically
Secure
Pseudorandom Number Generators -- 7 Other Random Sequences....
”
Read Now
19
Computing and Combinatorics : 21st International Conference, COCOON 2015, Beijing, China, August 4-6, 2015, Proceedings
Published 2015
Springer International Publishing
Table of Contents:
“
... theory -- Cryptography, reliability and
security
-- Database theory, computational biology...
”
Read Now
20
Algorithms for Sensor Systems : 11th International Symposium on Algorithms and Experiments for Wireless Sensor Networks, ALGOSENSORS 2015, Patras, Greece, September 17-18, 2015, Re...
Published 2015
Springer International Publishing
Table of Contents:
“
... and lightweight
security
architecture to
secure
the IoT throughout the lifecycle of a device based on HIMMO...
”
1
2
3
4
5
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 518 - Numerical analysis
Year of Publication
From:
To:
Classification
518 - Numerical analysis
Language
English
85
German
2
Collection
Springer eBooks 2005-
81
Springer Book Archives -2004
5
Cambridge Books Online
1
Author
Zomaya, Albert
7
Li, Kenli
5
Martinez, Gregorio
5
Wang, Guojun
5
Li, Jin
4
Shi, Yuhui
4
more ...
Tan, Ying
4
Vaidya, Jaideep
4
Buarque, Fernando
3
Gelbukh, Alexander
3
Qiu, Meikang
3
Squillero, Giovanni
3
Stojmenovic, Ivan
3
Burelli, Paolo
2
Du, Ding-Zhu
2
Esparcia-Alcázar, Anna I.
2
Katzenbeisser, Stefan
2
Mora, Antonio M.
2
Qu, Wenyu
2
Sun, Xiang-he
2
Wen, Sheng
2
Yang, Laurence T.
2
Zhou, Wanlei
2
Aarts, Emile
1
Adeli, Hojjat
1
Afek, Yehuda
1
Alefeld, Götz
1
Antonov, A.G.
1
Ao, Sio-Iong
1
Apduhan, Bernady O.
1
Arabnia, Hamid R.
1
Balitanas, Maricel
1
Bender, Michael A.
1
Bielikova, Maria
1
Bose, Prosenjit
1
Bourgeois, Julien
1
Bär, Tobias
1
Cachin, Christian
1
Cai, Zhipeng
1
Cao, Jiannong
1
Caragiannis, Ioannis
1
Cardei, Mihaela
1
Cerná, Ivana
1
Challal, Yacine
1
Chellappan, Sriram
1
Chen, Jianer
1
Chen, Su-Shing
1
Chen, Yijia
1
Cheng, Siyao
1
Cheng, Wei
1
Cheng, Yu
1
Choo, Kim-Kwang Raymond
1
Chávez, Edgar
1
Crowcroft, Jon
1
Csiszár, Imre
1
Csuhaj-Varjú, Ersébet
1
Deng, Xiaotie
1
Dietzfelbinger, Martin
1
Dress, Andreas
1
Du, Dingzhu
1
Du, Donglei
1
Esparza, Javier
1
Eun, Do Young
1
Farach-Colton, Martín
1
Feng, Qilong
1
Ferro, Alfredo
1
Fischlin, Marc
1
Fraigniaud, Pierre
1
Friedrich, Gerhard
1
Fu, Bin
1
Gavrilova, Marina L.
1
Ghosh, Debdas
1
Giri, Debasis
1
Godunov, S.K.
1
Gottlob, Georg
1
Gudmundsson, Joachim
1
Guerraoui, Rachid
1
Gupta, Prosenjit
1
Gyimóthy, Tibor
1
Gąsieniec, Leszek Antoni
1
Halldórsson, Magnús M.
1
Hromkovič, Juraj
1
Hsu, Ching-Hsien
1
Hu, Bin
1
Hu, Ting
1
Huang, Yan
1
Husfeldt, Thore
1
Ibrahim, Shadi
1
Iwama, Kazuo
1
Jeffery, Keith
1
Jiang, Dingde
1
Jing, Tao
1
Kesswani, Nishtha
1
Khreishah, Abdallah
1
Kim, Cheonshik
1
Kim, Donghyun
1
Kim, Tai-hoon
1
Kiriljuk, O.P.
1
Klein, Andreas
1
Kneusel, Ronald T.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22518+-+Numerical+analysis%22&lookfor=%28%28%22secularity%22+OR+%22peculiarity%22%29+OR+%22security%22%29&type=AllFields
Send by Email
×
Loading...