|
|
Formal Correctness of Security Protocols (Information Security and Cryptography)Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.
The author investigates proofs of correctness of realistic security protocols in... | | Agent Communication II: International Workshops on Agent Communication, AC 2005 and AC 2006, Utrecht, Netherlands, July 25, 2005, and Hakodate, JapanThis book constitutes the thoroughly refereed post-proceedings of the two International Workshops on Agent Communication, AC 2005 and AC 2006, held in Utrecht, Netherlands in July 2005, and in Hakodate, Japan in May 2006 as associated events of AAMAS 2005/2006, the main international conference on autonomous agents and multi-agent systems.
The... | | Modeling Semantic Web Services: The Web Service Modeling LanguageSemantic Web services promise to automate tasks such as discovery, mediation, selection, composition, and invocation of services, enabling fully flexible automated e-business. Their usage, however, still requires a significant amount of human intervention due to the lack of support for a machine-processable description.
In this book, Jos de... |
|
|
|
| | Concentrator Photovoltaics (Springer Series in Optical Sciences)Photovoltaic solar-energy conversion is one of the most promising technologies for generating renewable energy, and conversion of concentrated sunlight can lead to reduced cost for solar electricity. In fact, photovoltaic conversion of concentrated sunlight insures an efficient and cost-effective sustainable power resource. This book gives an... | | |
|
Result Page: Previous 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 Next |