Proceedings of the ... Southeastern Conference on Combinatorics, Graph Theory, and Computing
Author: Southeastern Conference on Combinatorics, Graph Theory, and Computing
Publisher:
Published: 1977
Total Pages: 704
ISBN-13:
DOWNLOAD EBOOKRead and Download eBook Full
Author: Southeastern Conference on Combinatorics, Graph Theory, and Computing
Publisher:
Published: 1977
Total Pages: 704
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1991
Total Pages: 1192
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1984
Total Pages: 340
ISBN-13:
DOWNLOAD EBOOKAuthor: B.R. Alspach
Publisher: Elsevier
Published: 1985-08-01
Total Pages: 483
ISBN-13: 0080872263
DOWNLOAD EBOOKThis volume deals with a variety of problems involving cycles in graphs and circuits in digraphs. Leading researchers in this area present here 3 survey papers and 42 papers containing new results. There is also a collection of unsolved problems.
Author: Frederick Hoffman
Publisher:
Published: 1976
Total Pages: 564
ISBN-13:
DOWNLOAD EBOOKAuthor: Frederick Hoffman
Publisher:
Published: 1983
Total Pages: 468
ISBN-13:
DOWNLOAD EBOOKAuthor:
Publisher:
Published: 1981
Total Pages: 438
ISBN-13:
DOWNLOAD EBOOKAuthor: D. Hausmann
Publisher: Springer Science & Business Media
Published: 2012-12-06
Total Pages: 326
ISBN-13: 3642463835
DOWNLOAD EBOOKAuthor: C. Kastning
Publisher: Springer Science & Business Media
Published: 2013-11-11
Total Pages: 504
ISBN-13: 3662022842
DOWNLOAD EBOOKInteger Prograw~ing is one of the most fascinating and difficult areas in the field of Mathematical Optimization. Due to this fact notable research contributions to Integer Programming have been made in very different branches of mathematics and its applications. Since these publications are scattered over many journals, proceedings volumes, monographs, and working papers, a comprehensive bibliography of all these sources is a helpful tool even for specialists in this field. I initiated this compilation of literature in 1970 at the Institut fur ~konometrie und Operations Research, University of Bonn. Since then many collaborators have contributed to and worked on it. Among them Dipl.-Math. Claus Kastning has done the bulk of the work. With great perseverance and diligence he has gathered all the material and checked it with the original sources. The main aim was to incorporate rare and not easily accessible sources like Russian journals, preprints or unpublished papers. Without the invaluable and dedicated engagement of Claus Kastning the bibliography would never have reached this final version. For this reason he must be considered its responsible editor. As with any other collection this literature list has a subjective viewpoint and may be in some sense incomplete. We have however tried to be as complete as possible. The bibliography contains 4704 different publications by 6767 authors which were classified by 11839 descriptor entries.
Author: Ernst L. Leiss
Publisher: Springer Science & Business Media
Published: 2012-12-06
Total Pages: 236
ISBN-13: 146844316X
DOWNLOAD EBOOKWith the greatly increased use of electronic media for processing and storing data, data security became an important practical issue. This is especially true for the extensively shared and distributed systems which are more and more being accepted in commercial operations. Essen tially, the problem is that of protecting data, including all the impli cations which this has to the end user as well as the systems or database designer. However, usually the term data security refers to protection by technical, i.e., computer science specific, means; if one wants to in clude issues such as physical security, how to select the group of people who should have authority to perform certain operations, etc., the term computer security is more appropriate. The object of this book is to provide technical solutions to (facets of) the problem of achieving data security. The reader who hopes to find clever recipes which allow circumventing protection mechanisms will, however, be sadly disappointed. In fact, we deliberately kept the presentation of the material at a fairly general level. While the short term benefit of such an approach may be somewhat smaller, we feel that without a thorough understanding of the fundamental issues and problems in data security there will never be secure systems. True, peo ple probably always considered certain security aspects when designing a system. However, an integrated approach is absolutely imperative.