1
2
Table of Contents:
“... -- Conducting a Web Browsing Behaviour Study – An Educational Scenario -- A Uniform Programmning Language for Implementing XML Standards -- OntoSDM: An Approach to Improve Quality on Spatial Data Mining Algorithms -- Cryptography, Security, and Verification...”
Full text
Full text
3
Du, Dingzhu.
2015
Table of Contents:
“...Algorithms and data structures -- Algorithmic game theory; approximation algorithms and online algorithms -- Automata, languages, logic and computability -- Complexity theory -- Computational learning theory -- Cryptography, reliability and security...”2015
Full text
4
Ferro, Alfredo.
2014
Table of Contents:
“... Chameleons.-Â Another Look at the Shoelace TSP: The Case of Very Old Shoes -- Playing Dominoes Is Hard, Except by Yourself.-Â UNO Gets Easier for a Single Player -- Secure Auctions without Cryptography.-Â Towards an Algorithmic Guide to Spiral Galaxies -- Competitive...”2014
Full text
5
6
Cai, Zhipeng.
2014
Table of Contents:
“... Theory and Algorithms -- Theory and Cryptography -- Scheduling Algorithms and Circuit Complexity -- CSoNet....”2014
Full text