This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic ...
اقرأ المزيدThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيدThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيدThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th IAPR TC3 International Workshop on Artificial Neural Networks in ...
اقرأ المزيدTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
اقرأ المزيدTo cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
اقرأ المزيدThis book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...
اقرأ المزيدCombines experimental and theoretical research on big data recommender systems to help computer scientists develop new concepts ...
اقرأ المزيدCombines experimental and theoretical research on big data recommender systems to help computer scientists develop new concepts ...
اقرأ المزيدCovers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures ...
اقرأ المزيدThe main theme of this book is the relation between the global structure of Banach spaces and the various types of generalized ...
اقرأ المزيدBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
اقرأ المزيدFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
اقرأ المزيدIncludes all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, ...
اقرأ المزيدScientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...
اقرأ المزيدThe global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication ...
اقرأ المزيدThis book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
اقرأ المزيدThis ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...
اقرأ المزيد