This book is the refereed proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, UIC ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing ...
اقرأ المزيدThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
اقرأ المزيدOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
اقرأ المزيدThis book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
اقرأ المزيدThe needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...
اقرأ المزيدThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
اقرأ المزيدThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
اقرأ المزيدThis book reports on methods and technologies to describe, evaluate and control uncertainty in mechanical engineering applications. ...
اقرأ المزيدThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
اقرأ المزيدThis volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
اقرأ المزيدThe Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
اقرأ المزيدThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
اقرأ المزيدThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
اقرأ المزيدNowadays, developers have to face the proliferation of hardware and software environments, the increasing demands of the ...
اقرأ المزيدMany animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This ...
اقرأ المزيدDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
اقرأ المزيدCovers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
اقرأ المزيدThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
اقرأ المزيد