Guillaume Bonfante - Böcker
Visar alla böcker från författaren Guillaume Bonfante. Handla med fri frakt och snabb leverans.
4 produkter
4 produkter
1 403 kr
Skickas inom 5-8 vardagar
1 790 kr
Skickas inom 7-10 vardagar
The paradigm of Graph Rewriting is used very little in the field of Natural Language Processing. But graphs are a natural way of representing the deep syntax and the semantics of natural languages. Deep syntax is an abstraction of syntactic dependencies towards semantics in the form of graphs and there is a compact way of representing the semantics in an underspecified logical framework also with graphs. Then, Graph Rewriting reconciles efficiency with linguistic readability for producing representations at some linguistic level by transformation of a neighbor level: from raw text to surface syntax, from surface syntax to deep syntax, from deep syntax to underspecified logical semantics and conversely.
Del 11358 - Lecture Notes in Computer Science
Foundations and Practice of Security
11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papers
Häftad, Engelska, 2019
726 kr
Skickas inom 10-15 vardagar
This book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018. cyber physical security and hardware security;
Del 9482 - Lecture Notes in Computer Science
Foundations and Practice of Security
8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers
Häftad, Engelska, 2016
552 kr
Skickas inom 10-15 vardagar
This book constitutes the thoroughly refereedpost-conference proceedings of the 8th International Symposium on Foundationsand Practice of Security, FPS 2015, held in Clermont-Ferrand, France, inOctober 2015.The 12 revised full papers presented together with 8short papers and 2 keynote talks were carefully reviewed and selected from 58submissions. The papers are organized in topical sections on RFID, sensors andsecure computation; security policies and biometrics; evaluation of protocolsand obfuscation security; spam emails, botnets and malware.