Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • UB Potsdam  (7)
  • SeeCampus-Bibliothek
  • DZA Berlin
  • Ev. Landeskirche EKBO / Berl. Missionswerk
  • SB Eisenhüttenstadt
  • Informatik  (7)
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Zugriff
  • 1
    Buch
    Buch
    New York :New York University Press,
    UID:
    almahu_BV044748837
    Umfang: xv, 229 Seiten : , Illustrationen ; , 23 cm.
    ISBN: 978-1-4798-4994-9 , 978-1-4798-3724-3
    Inhalt: In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities. Data discrimination is a real social problem; Noble argues that the combination of private interests in promoting certain sites, along with the monopoly status of a relatively small number of Internet search engines, leads to a biased set of search algorithms that privilege whiteness and discriminate against people of color, specifically women of color. Through an analysis of textual and media searches as well as extensive research on paid online advertising, Noble exposes a culture of racism and sexism in the way discoverability is created online. As search engines and their related companies grow in importance—operating as a source for email, a major vehicle for primary and secondary school learning, and beyond—understanding and reversing these disquieting trends and discriminatory practices is of utmost importance. An original, surprising and, at times, disturbing account of bias on the internet, Algorithms of Oppression contributes to our understanding of how racism is created, maintained, and disseminated in the 21st century. Quelle/Source: Klappentext
    Anmerkung: Dissertation California State University
    Weitere Ausg.: Erscheint auch als Online-Ausgabe ISBN 978-1-4798-6676-2
    Weitere Ausg.: Erscheint auch als Online-Ausgabe ISBN 978-1-4798-3364-1
    Sprache: Englisch
    Fachgebiete: Informatik , Ethnologie , Allgemeines , Soziologie
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Internet ; Suchmaschine ; Algorithmus ; Diskriminierung ; Rassismus ; Hochschulschrift ; Hochschulschrift ; Hochschulschrift
    Mehr zum Autor: Noble, Safiya Umoja.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9947364520402882
    Umfang: XII, 523 p. 137 illus., 60 illus. in color. , online resource.
    ISBN: 9783642245411
    Serie: Lecture Notes in Computer Science, 6875
    Inhalt: This Festschrift volume, published in honor of Brian Randell on the occasion of his 75th birthday, contains a total of 37 refereed contributions. Two biographical papers are followed by the six invited papers that were presented at the conference 'Dependable and Historic Computing: The Randell Tales', held during April 7-8, 2011 at Newcastle University, UK. The remaining contributions are authored by former scientific colleagues of Brian Randell. The papers focus on the core of Brian Randell’s work: the development of computing science and the study of its history. Moreover, his wider interests are reflected and so the collection comprises papers on software engineering, storage fragmentation, computer architecture, programming languages and dependability. There is even a paper that echoes Randell’s love of maps. After an early career with English Electric and then with IBM in New York and California, Brian Randell joined Newcastle University. His main research has been on dependable computing in all its forms, especially reliability, safety and security aspects, and he has led several major European collaborative projects.
    Anmerkung: Part A: Biographical -- What I Learned from Brian (Hermann Kopetz) -- Brian Randell: A Biographical Note (John L. Lloyd and Tom Anderson) -- Part B: Conference Papers -- On Building a Referee’s Avatar (Algirdas Avizienis) -- From Theory to Practice: The Invention of Programming, 1947-51 (Martin Campbell-Kelly) -- Transactions: From Local Atomicity to Atomicity in the Cloud (David Lomet) -- From DSS to MILS (John Rushby) -- Pre-electronic Computing (Doron Swade) -- Whetstone Wanderings (Brian Wichmann) -- Part C: Contributed Papers -- Using Real-Time Road Traffic Data to Evaluate Congestion (Jean Bacon, Andrei Iu. Bejan, Alastair R. Beresford, David Evans, Richard J. Gibbens, and Ken Moody) -- Fault Tolerant Autonomic Computing Systems in a Chemical Setting (Jean-Pierre Banatre, Christine Morin, and Thierry Priol) -- Out of a Closet: The Early Years of the Computer Museum (Gordon Bell) -- Timing Faults and Mixed Criticality Systems (Alan Burns and Sanjoy Baruah) -- Professor Brian Randell and the History of Computing (Paul E. Ceruzzi) -- Computer Storage Fragmentation: Pioneering Work of Brian Randell (Ed Coffman) -- IBM-ACS: Reminiscences and Lessons Learned from a 1960’s Supercomputer Project (Lynn Conway) -- The Belgian Electronic Mathematical Machine (1951-1962): An Account (Pierre-Jacques Courtois) -- On the Resilience of the Dependability Framework to the Intrusion of New Security Threats (Marc Dacier) -- Virtual Fault Tolerance (Peter J. Denning) -- Recovery Blocks (Tony Hoare) -- The Development and Writing of “Process Structuring” (J.J. Horning) -- A Tolerant Approach to Faults (Michael Jackson) -- Causality in Structured Occurrence Nets (Jetty Kleijn and Maciej Koutny) -- Diversity (John C. Knight) -- Swords and Ploughshares: Connections between Computer Projects for War and Peace, 1945–55 (Simon Lavington) -- The Evolution of the Arjuna Transaction Processing System (M.C. Little and S.K. Shrivastava) -- Making Experiments Dependable (Roy Maxion) -- Wallpaper Maps (M. Douglas McIlroy) -- Incremental Design: Programming with Holes and Evolvers (Ron Morrison, Dharini Balasubramaniam, and Brian Warboys) -- Carrying Goals to Newcastle: A Tribute to Brian Randell (Peter G. Neumann) -- Distributed Computing in the 21st Century: Some Aspects of Cloud Computing (Fabio Panzieri, Ozalp Babaoglu, Stefano Ferretti, Vittorio Ghini, and Moreno Marzolla) -- Software Engineering: Multi-person Development of Multi-version Programs (David Lorge Parnas) -- Tolerance of Design Faults (David Powell, Jean Arlat, Yves Deswarte, and Karama Kanoun) -- On the Implementation of Concurrent Objects (Michel Raynal) -- Beyond Traces and Independence (Fred B. Schneider) -- Socio-technical Complex Systems of Systems: Can We Justifiably Trust Their Resilience? (Luca Simoncini) -- Safety, Security and Dependability in Crowd Computing (W_ladys_law M. Turski) -- Achieving Dependability in Service-Oriented Systems (Jie Xu).
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783642245404
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Festschrift ; Konferenzschrift ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    gbv_1647284988
    Umfang: 1 Online-Ressource (xix, 264 Seiten) , Diagramme
    Ausgabe: Second Edition
    ISBN: 9780387271088
    Serie: Health informatics
    Inhalt: Through the use of case studies, this volume addresses the complex challenges involved in implementing technological change in healthcare organizations
    Anmerkung: Description based upon print version of record , Introduction; GEMINI: The Life and Times of a Clinical Information System; Introduction; The Web Center: A Case Study in Strategy and Power; Computers for Kids: Not All Fun and Games; Managing Change; Managing Success: An Information Systems Dilemma at Great Plains Health Care; Introduction; Bar Coding: It's Hard to Kill a Hippo; Developing an Emergency Department Information System; Implementation of OpChart in West Medical Building; Development of the Scientific Computing Center at Vanderbilt University , Early Implementation Problems of an Integrated Information System Within the White Mountain University Health SystemImplementation of a Web-Based Incident-Reporting System at Legendary Health System; Managing Change: Analysis of a Hypothetical Case; Introduction; E3 at Vanderbilt University Medical Center; Catch 22: The Case of Utilization Management's Return on Investment Evaluation; Antimicrobial Utilization Program at the University of Central State Medical Center; Central Medical Healthcare System: The Case of the Well-Aggregated Patient Data , Building Consensus: Quality Improvement at Vesalius Health SystemIntroduction; Strategic Informatics: Planning for the Future of AtlanticHealth; Fix Pharmacy!; Showdown in the Heart of Texas; Mission Valley Medical Center Physicians Group Practice: The Rumor; The DNA Donation Project; Who's in Charge?; Introduction; The Chief Resident's Dilemma; Death of a Committee; Whose Job Is It Anyway?; All for the Want of a Plan …; Fail to Plan, Plan to Fail; Founding Fathers Health Corporation: Idealism and the Bottom Line;
    Weitere Ausg.: ISBN 038721447X
    Weitere Ausg.: ISBN 9780387214474
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Transforming health care through information New York, NY : Springer, 2005 ISBN 038721447X
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Gesundheitsinformationssystem ; Gesundheitsinformationssystem ; Aufsatzsammlung
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_9947364203002882
    Umfang: XIV, 247 p. , online resource.
    ISBN: 9783540732303
    Serie: Lecture Notes in Computer Science, 4498
    Inhalt: Reliable Software Technologies is an annual series of international conferences devoted to the promotion and advancement of all aspects of reliable software technologies. The objective of this series of conferences, initiated and sponsored by Ada-Europe, the European federation of national Ada societies, is to provide a forum to promote the development of reliable softwares both as an industrial technique and an academic discipline. Previous editions of the Reliable Software Technologies conference were held in: Porto (Portugal) in 2006, York (UK) in 2005, Palma de Mallorca (Spain) in 2004,Toulouse (France) in 2003,Vienna (Austria) in 2002,Leuven (Belgium) in 2001,Potsdam(Germany)in2000,Santander(Spain)in1999,Uppsala(Sweden) in 1998, London (UK) in 1997 and Montreux (Switzerland) in 1996. The 12th International Conference on Reliable Software Technologies took place in Geneva, Switzerland, June 25-29, 2007, under the continued sponsoring ofAda-Europe,incooperationwithACMSIGAda.Itwasorganizedbymembers of the University of Applied Sciences, Western Switzerland (Engineering School of Geneva), in collaboration with colleagues from various places in Europe. The 13th conference, in 2008, will take place in Venice, Italy.
    Anmerkung: Real-Time Utilities for Ada 2005 -- Handling Temporal Faults in Ada 2005 -- Implementation of New Ada 2005 Real-Time Services in MaRTE OS and GNAT -- Enhancing Dependability of Component-Based Systems -- On Detecting Double Literal Faults in Boolean Expressions -- Static Detection of Livelocks in Ada Multitasking Programs -- Towards the Testing of Power-Aware Software Applications for Wireless Sensor Networks -- An Intermediate Representation Approach to Reducing Test Suites for Retargeted Compilers -- Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach -- A Metamodel-Driven Process Featuring Advanced Model-Based Timing Analysis -- ArchMDE Approach for the Development of Embedded Real Time Systems -- Generating Distributed High Integrity Applications from Their Architectural Description -- Automatic Ada Code Generation Using a Model-Driven Engineering Approach -- Towards User-Level Extensibility of an Ada Library: An Experiment with Cheddar -- Modelling Remote Concurrency with Ada -- Design and Performance of a Generic Consensus Component for Critical Distributed Applications -- Sancta: An Ada 2005 General-Purpose Architecture for Mobile Robotics Research -- Incorporating Precise Garbage Collection in an Ada Compiler.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540732297
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    gbv_1625843186
    Umfang: xi, 338 Seiten , Illustrationen, Diagramme, Karten , 22 cm
    Ausgabe: First edition
    ISBN: 9780062390868 , 9780062390851
    Inhalt: How much sex are people really having? How many Americans are actually racist? Is America experiencing a hidden back-alley abortion crisis? Can you game the stock market? Does violent entertainment increase the rate of violent crime? Do parents treat sons differently from daughters? How many people actually read the books they buy? In this work, Seth Stephens-Davidowitz, a Harvard-trained economist, former Google data scientist, and New York Times writer, argues that much of what we thought about people has been dead wrong. The reason? People lie, to friends, lovers, doctors, surveys -- and themselves. However, we no longer need to rely on what people tell us. New data from the internet -- the traces of information that billions of people leave on Google, social media, dating, and even pornography sites -- finally reveals the truth. By analyzing this digital goldmine, we can now learn what people really think, what they really want, and what they really do. Sometimes the new data will make you laugh out loud. Sometimes the new data will shock you. Sometimes the new data will deeply disturb you. But, always, this new data will make you think.--
    Sprache: Englisch
    Fachgebiete: Informatik , Allgemeines , Soziologie
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Big Data ; Psychologie ; Internet ; Big Data ; Datenanalyse ; Verhaltensmuster ; Data Mining ; Falschaussage ; Big Data ; Psychologie ; Internet ; Data Mining ; Big Data ; Psychologie ; Internet ; Data Mining
    Mehr zum Autor: Pinker, Steven 1954-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Berlin : Springer
    UID:
    gbv_1652326715
    Umfang: Online-Ressource (XII, 263 S. 100 Abb. in Farbe, digital)
    ISBN: 9783642154539
    Serie: X.media.press
    Inhalt: Einleitung -- I. Bausteine zu einer Theorie interaktiver Infografiken -- Definition, Grundbegriffe, Einordnung -- Typologie -- Dramaturgische Muster -- Interaktive Karten und Geovisualisierungen -- Infografik und Comic -- Infografiken aus mediendidaktischer Sicht -- II. Rezeption und Wirkungsanalyse -- Evaluation interaktiver Visualisierungen -- Navigation, Interaktion, Multimedialität. Rezeptions- und Nutzungsprobleme bei interaktiven Infografiken -- III. Prozesse, Praktiken, Haltungen -- Das Diagramm ist tot, es lebe das Diagramm -- Im Vordergrund steht immer die Information. Erfahrungen eines Infografikers -- "Das würde ich anders machen". - Produktionspraktiken interaktiver Infografiken -- "We are journalists". Ein Interview mit der New York Times -- Best Practice -- IV. Interkulturelle Aspekte.
    Inhalt: Infografik, interaktiv - allein diese beiden Begriffe füllen Bücher! Interaktive Infografik: Zu dieser Kombination wurde bis jetzt wenig publiziert. Diese Lücke will der vorliegende Band schließen. Er führt ein in Theorie, Design und Rezeption von interaktiven Infografiken. Die Autorinnen und Autoren betrachten die interaktive Infografik aus theoretischer und praktischer Perspektive: Sie erforschen die interaktive Infografik als Diagramm, als Karte, als Comic, als hybride Form, beschreiben Typen und Muster und vergleichen westliche mit fernöstlichen Designvarianten. Sie stellen die interaktive Infografik in den Kontext von Lernen und Wissenserwerb, diskutieren Evaluationsmethoden, analysieren Rezeptions- und Nutzungsprobleme und leiten daraus Gestaltungsempfehlungen ab. Fallbeispiele und Expertentipps ergänzen die Beiträge und erhöhen den praktischen Nutzen des Werks.
    Anmerkung: Includes bibliographical references , Vorwort; Danksagung; Inhaltsverzeichnis; Teil I Theoretische Grundlagen; 1 Interaktive Infografiken: Standortbestimmung und Definition; 1.1 Forschungskontext; 1.2 Begriffskontext; 1.3 Bild - Sprache - Zahl; 1.4 Interaktiv - Statisch - Animiert; 1.5 Linear - Nonlinear; 1.6 Multimedial - Multimodal; 1.7 Deskriptiv - Explikativ - Narrativ; 1.8 Definition: Interaktive Infografik; Literatur; 2 Typen, Muster und hybride Formen. Ein Typologisierungsmodell für interaktive Infografiken; 2.1 Einleitung; 2.2 Was andere schon erforscht haben; 2.3 Qualitative Inhaltsanalyse , 2.4 Dramaturgiemuster und ihre Mustervarianten2.5 Fazit; 2.6 Untersuchungskorpus; Literatur; 3 Interaktive Karten und Geovisualisierungen; 3.1 Einführung. Von der gedruckten Karte zur interaktiven Geovisualisierung; 3.2 Theoretische und methodische Grundlagen der Kartografie und Geovisualisierung; 3.3 Wichtige Entwicklungstendenzen für interaktive Karten und Geovisualisierungen als Informationsgrafiken; 3.4 Formen der Interaktion mit Karten und Geovisualisierungen; 3.5 Anwendungsbeispiele; Literatur; 4 Wahrnehmungsprozesse bei interaktiven Infografiken - Theorien und Modelle; 4.1 Einleitung , 4.2 Was bedeutet „Behalten" und „Verstehen" von Informationen?4.3 Lernen und Multimedia; 4.4 Modelle und Theorien zum Lernen mit Neuen Medien; 4.5 Fazit; Literatur; Teil II Evaluation und empirische Analysen; 5 Ansätze zur Evaluation interaktiver Infografiken; 5.1 Qualitätssicherung und Qualitätskontrolle durch Evaluation; 5.2 Konzepte zur Qualität interaktiver Infografiken: Wissenserwerb, Usability und User Experience; 5.3 Verortung der Evaluation im Produktionsprozess; 5.4 Evaluation der Rezeptions- und Nutzungsqualität; 5.5 Formative Evaluation der User Experience , 5.6 Evaluation des Wissenserwerbs5.7 Ausblick; Literatur; 6 Navigation - Interaktion - Informationspräsentation. Rezeptions- und Nutzungsprobleme bei interaktiven Infografiken; 6.1 Untersuchung zu Rezeption und Nutzung von Infografiken; 6.2 Inhalte darstellen; 6.3 Präsentation von Informationen; 6.4 Text in Infografiken; 6.5 Interaktion; 6.6 Steuerung dynamischer Medien; 6.7 Schluss; Literatur; Teil III Fallbeispiele und praktische Anwendungen; 7 Das Diagramm ist tot, es lebe das Diagramm; 7.1 Einleitung; 7.2 Proportionalitätsgebot; 7.3 Vergleichsgebot; 7.4 Konformitätsgebot; 7.5 Schluss , Literatur8 Im Vordergrund steht immer die Information. Erfahrungen eines Infografikers; 8.1 Einleitung; 8.2 Was bedeutet das für Infografiker?; 8.3 Die interaktive Grafik; 8.4 Das Erklärziel; 8.5 Ein Fallbeispiel, gedruckt und interaktiv: Der Tod von Lady Diana; 8.6 Fazit; Weiterführende Literatur; 9 ``We Are Journalists.'' Production Practices, Attitudes and a Case Study of the New York Times Newsroom; 9.1 Introduction; 9.2 Design of the Study; 9.3 Results; 9.4 The New York Times - A Case Study; 9.5 Conclusions; References; Teil IV Perspektivenwechsel , 10 Comics and Interactive Information Graphics , Einleitung -- I. Bausteine zu einer Theorie interaktiver Infografiken -- Definition, Grundbegriffe, Einordnung -- Typologie -- Dramaturgische Muster -- Interaktive Karten und Geovisualisierungen -- Infografik und Comic -- Infografiken aus mediendidaktischer Sicht -- II. Rezeption und Wirkungsanalyse -- Evaluation interaktiver Visualisierungen -- Navigation, Interaktion, Multimedialität. Rezeptions- und Nutzungsprobleme bei interaktiven Infografiken -- III. Prozesse, Praktiken, Haltungen -- Das Diagramm ist tot, es lebe das Diagramm -- Im Vordergrund steht immer die Information. Erfahrungen eines Infografikers -- "Das würde ich anders machen". - Produktionspraktiken interaktiver Infografiken -- "We are journalists". Ein Interview mit der New York Times -- Best Practice -- IV. Interkulturelle Aspekte.
    Weitere Ausg.: ISBN 9783642154522
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Interaktive Infografiken Berlin : Springer Vieweg, 2013 ISBN 9783642154522
    Sprache: Deutsch
    Fachgebiete: Informatik , Allgemeines
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Informationsgrafik ; Computeranimation ; Visualisierung ; Informationsgrafik ; Computeranimation ; Visualisierung
    URL: Volltext  (lizenzpflichtig)
    Mehr zum Autor: Weber, Wibke 1965-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    gbv_1646675924
    Umfang: Online-Ressource
    ISBN: 9783540338529 , 3540338519 , 9783540338512
    Serie: Lecture Notes in Computer Science 3958
    Inhalt: Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents -- An Attack on a Modified Niederreiter Encryption Scheme -- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm -- Distributed Crypto-computing -- Efficient Polynomial Operations in the Shared-Coefficients Setting -- Generic On-Line/Off-Line Threshold Signatures -- Linear Integer Secret Sharing and Distributed Exponentiation -- Encryption Methods -- Encoding-Free ElGamal Encryption Without Random Oracles -- Parallel Key-Insulated Public Key Encryption -- Provably Secure Steganography with Imperfect Sampling -- Cryptographic Hash and Applications -- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited -- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption -- Number Theory Algorithms -- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve -- Efficient Scalar Multiplication by Isogeny Decompositions -- Curve25519: New Diffie-Hellman Speed Records -- Pairing-Based Cryptography -- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman -- Generalization of the Selective-ID Security Model for HIBE Protocols -- Identity-Based Aggregate Signatures -- On the Limitations of the Spread of an IBE-to-PKE Transformation -- Cryptosystems Design and Analysis -- Inoculating Multivariate Schemes Against Differential Attacks -- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol -- High-Order Attacks Against the Exponent Splitting Protection -- Signature and Identification -- New Online/Offline Signature Schemes Without Random Oracles -- Anonymous Signature Schemes -- The Power of Identification Schemes -- Authentication and Key Establishment -- Security Analysis of KEA Authenticated Key Exchange Protocol -- SAS-Based Authenticated Key Agreement -- The Twist-AUgmented Technique for Key Exchange -- Password-Based Group Key Exchange in a Constant Number of Rounds -- Multi-party Computation -- Conditional Oblivious Cast -- Efficiency Tradeoffs for Malicious Two-Party Computation -- PKI Techniques -- On Constructing Certificateless Cryptosystems from Identity Based Encryption -- Building Better Signcryption Schemes with Tag-KEMs -- Security-Mediated Certificateless Cryptography -- k-Times Anonymous Authentication with a Constant Proving Cost.
    Inhalt: The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of Cr- tologic Research (IACR), and this year it was also sponsored by the Columbia University Computer Science Department as well as a number of sponsors from industry, among them: EADS and Morgan Stanley, which were golden sponsors, as well as Gemplus, NTT DoCoMo, Google, Microsoft and RSA Security, which were silver sponsors. We acknowledge the generous support of our industrial sponsors; their support was a major contributing factor to the success of this year’s PKC. PKC 2006 followed a series of very successful conferences that started in 1998in Yokohama,Japan.Further meetingswereheld successivelyinKamakura (Japan), Melbourne (Australia), Jeju Island (Korea), Paris (France), Miami (USA), Singapore and Les Diablerets (Switzerland). The conference became an IACR sponsored event (o?cially designated as an IACR workshop) in 2003 and has been sponsored by IACR continuously since then. The year 2006 found us all in New York City where the undertone of the conference was hummed in the relentless rhythm of the city that never sleeps.
    Weitere Ausg.: ISBN 9783540338512
    Weitere Ausg.: Buchausg. u.d.T. PKC (9 : 2006 : New York, NY) Public key cryptography - PKC 2006 Berlin : Springer, 2006 ISBN 3540338519
    Weitere Ausg.: ISBN 9783540338512
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Public-Key-Kryptosystem ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie the new york tides?
Meinten Sie the new york temes?
Meinten Sie the new york tames?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz