selim g akl

Grid   List

  1. Ebook
    Sofort lieferbar
    Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and or perform f...
    96,29 €
    Alle Preise inkl. MwSt
  2. Ebook
    Sofort lieferbar
    From Parallel to Emergent Computing provides a visionary statement on how computing will advance in the next 25 years and what new fields of science will be involved in computing engineering. This ...
    60,99 €
    Alle Preise inkl. MwSt
  3. Ebook
    Sofort lieferbar
    From Parallel to Emergent Computing provides a visionary statement on how computing will advance in the next 25 years and what new fields of science will be involved in computing engineering. This ...
    60,99 €
    Alle Preise inkl. MwSt
  4. Ebook
    Sofort lieferbar
    There is a world beyond Turing, as more and more computer researchers are demonstrating, but where would you find out about the current leading edge in unconventional computation? Here, in this fas...
    53,49 €
    Alle Preise inkl. MwSt
  5. Ebook
    Sofort lieferbar
    Parallel Sorting Algorithms explains how to use parallel algorithms to sort a sequence of items on a variety of parallel computers. The book reviews the sorting problem, the parallel models of comp...
    54,95 €
    Alle Preise inkl. MwSt
  6. Taschenbuch
    Bezug 11-15
    There is a world beyond Turing, as more and more computer researchers are demonstrating, but where would you find out about the current leading edge in unconventional computation? Here, in this ...
    53,49 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  7. Taschenbuch
    Bezug 11-15
    This volume constitutes the proceedings of the Fourth International Workshop on Algorithms and Data Structures, WADS '95, held in Kingston, Canada in August 1995.The book presents 40 full refer...
    53,49 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  8. Taschenbuch
    Bezug 11-15
    This volume contains selected and invited papers presented at the International Conference on Computing and Information, ICCI '90, Niagara Falls, Ontario, Canada, May 23-26, 1990. ICCI conferences ...
    53,49 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  9. Buch
    Bezug 11-15
    Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and or perfor...
    125,28 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  10. Taschenbuch
    Bezug 16-20
    Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and or perfor...
    125,28 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  11. Taschenbuch
    Bezug 16-20
    Modern computing relies on future and emergent technologies which have been conceived via interaction between computer science, engineering, chemistry, physics and biology. This highly interdiscipl...
    80,96 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  12. Taschenbuch
    Print on Demand
    The weird quantum mechanical effects governing the behavior of sub-atomic particles are about to revolutionize the way we perform computation and manipulate information. This book is a testimony ...
    68,00 €
    Alle Preise inkl. MwSt | Versandkostenfrei
  1. 1
  2. 2
<%--for search--%>