Andrei Tchernykh - Böcker
Visar alla böcker från författaren Andrei Tchernykh. Handla med fri frakt och snabb leverans.
5 produkter
5 produkter
Supercomputing
9th International Conference, ISUM 2018, Mérida, Mexico, March 5–9, 2018, Revised Selected Papers
Häftad, Engelska, 2018
554 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 9th International Conference on Supercomputing, ISUM 2018, held in Mérida, Mexico, in March 2018. The 19 revised full papers presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on scheduling, architecture, and programming;
High Performance Computing
7th Latin American Conference, CARLA 2020, Cuenca, Ecuador, September 2–4, 2020, Revised Selected Papers
Häftad, Engelska, 2021
552 kr
Skickas inom 10-15 vardagar
This book constitutes revised selected papers of the 7th Latin American High Performance Computing Conference, CARLA 2020, held in Cuenca, Ecuador, in September 2020. The papers included in this book are organized according to the topics on ?High Performance Computing Applications; High Performance Computing and Artificial Intelligence.
Del 424 - Lecture Notes in Networks and Systems
Mathematics and its Applications in New Computer Systems
MANCS-2021
Häftad, Engelska, 2022
1 690 kr
Skickas inom 10-15 vardagar
This book is based on the best papers accepted for presentation during the International Conference on Mathematics and its Applications in New Computer Systems (MANCS-2021), Russia.The book includes research materials on modern mathematical problems, solutions in the field of cryptography, data analysis and modular computing, as well as scientific computing. The scope of numerical methods in scientific computing presents original research, including mathematical models and software implementations, related to the following topics: numerical methods in scientific computing; solving optimization problems; methods for approximating functions, etc. The studies in mathematical solutions to cryptography issues are devoted to secret sharing schemes, public key systems, private key systems, n-degree comparisons, modular arithmetic of simple, addition of points of an elliptic curve, Hasse theorem, homomorphic encryption and learning with error, and modifications of the RSA system. Furthermore, issues in data analysis and modular computing include contributions in the field of mathematical statistics, machine learning methods, deep learning, and neural networks. Finally, the book gives insights into the fundamental problems in mathematics education. The book intends for readership specializing in the field of cryptography, information security, parallel computing, computer technology, and mathematical education.
Del 1044 - Lecture Notes in Networks and Systems
Current Problems of Applied Mathematics and Computer Systems
CPAMCS 2023
Häftad, Engelska, 2024
2 320 kr
Skickas inom 7-10 vardagar
The scope of numerical methods in scientific computing presents original research, including mathematical models and software implementations, related to the following topics: numerical methods in scientific computing;
Del 863 - Lecture Notes in Networks and Systems
AISMA-2024: International Workshop on Advanced Information Security Management and Applications
Häftad, Engelska, 2024
2 498 kr
Skickas inom 10-15 vardagar
This book is based on the best papers accepted for presentation during the AISMA-2024: International Workshop on Advanced in Information Security Management and Applications. The book includes research on information security problems and solutions in the field of security awareness, blockchain and cryptography, data analysis, authentication and key distribution, security incidents. The scope of research methods in information security management presents original research, including mathematical models and software implementations, related to the following topics: describing security incidents, blockchain technology, machine learning-based approaches in wireless sensor networks, phishing attack response scenarios, biometric authentication, information security audit procedures, depersonalization process.In addition, some papers focus on dynamics risks infrastructural genesis at critical information infrastructure facilities. Finally, the book gives insights into the some problems in forecasting the development of information security events. The book intends for readership specializing in the field of information security management and applications, information security methods and features.