 
                The book address the latest results in the research and applications of Semantic Web technologies and cover topics including: ...
اقرأ المزيد 
                The book is organized in topical sections on agents, application ontologies, applications, formal languages, foundational ...
اقرأ المزيد 
                The book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
اقرأ المزيد 
                This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيد 
                The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد 
                This volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
اقرأ المزيد 
                This book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
اقرأ المزيد 
                The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
اقرأ المزيد 
                The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
اقرأ المزيد 
                The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
اقرأ المزيد 
                This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
اقرأ المزيد 
                The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
اقرأ المزيد 
                Interference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
اقرأ المزيد 
                The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
اقرأ المزيد 
                This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
اقرأ المزيد 
                The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد 
                This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيد 
                This book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...
اقرأ المزيد 
                The First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
اقرأ المزيد 
                This book address all current topics in Web reasoning and rule systems such as acquisition of rules and ontologies by knowledge ...
اقرأ المزيد