The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
اقرأ المزيدThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
اقرأ المزيدThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
اقرأ المزيدThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
اقرأ المزيدTrusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
اقرأ المزيدThis book presents new research on the mathematical description of tsunamis and hurricanes. The book uses the equivalence ...
اقرأ المزيدTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
اقرأ المزيدThis volume introduces some basic mathematical models for cell cycle, proliferation, cancer, and cancer therapy.
اقرأ المزيدThe book offers an easy introduction to fast growing research areas in evolution of species, population genetics, ecological ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
اقرأ المزيدThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
اقرأ المزيدThis book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
اقرأ المزيد5. 1. 1 Biological Rhythms and Clocks From an evolutionary perspective, the adaptation of an organism’s behavior to its ...
اقرأ المزيدUltrasonic Nondestructive Evaluation Systems: Models and Measurements provides the latest information and techniques available ...
اقرأ المزيدThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
اقرأ المزيدThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
اقرأ المزيدProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
اقرأ المزيدDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
اقرأ المزيدThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
اقرأ المزيد