This book describes the development and use of supercomputers in the period 1960-1996, a time tha...
There are significant financial and legal implications for ensuring design correctness and safety...
This book outlines a methodology to develop formally verified Just-in-Time compilers. Just-in-Tim...
Software obfuscation is used in cryptography to transform source code to make it unintelligible w...
This is a comprehensive history of computer graphics in Hollywood cinema. As the first such work ...
Today's Internet of Things (IoT) devices are bulky, expensive, require battery maintenance, and i...
This book is based on the author's experience of 30 years of teaching programming at the Universi...
The Handbook of Multimodal-Multisensor Interfaces provides the first authoritative resource on wh...
Parallelism is the key to achieving high performance in computing. However, writing efficient and...
The Fourier transform is one of the most fundamental tools for computing the frequency representa...
As human activities moved to the digital domain, so did all the well-known malicious behaviors in...
The idea of this book grew out of a symposium that was held at Stony Brook in September 2012 in c...