The text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
اقرأ المزيد
Contains new examples and material highlighting the emergence of mobile computing and the cloud. It explores this generational ...
اقرأ المزيد
Designed to be used in modern computing environments such as cloud computing, mobile devices, and other embedded systems. ...
اقرأ المزيدComputer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book presents ...
اقرأ المزيد
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
اقرأ المزيد
It' s important to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied ...
اقرأ المزيد
It' s important to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...
اقرأ المزيد
The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Computer Science Symposium in Russia, CSR 2008, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the First International Symposium on Computer Science in Russia, CSR 2006. ...
اقرأ المزيد
This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
اقرأ المزيد
This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
اقرأ المزيد
These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
اقرأ المزيد
This book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative ...
اقرأ المزيد
The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
اقرأ المزيد