The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
اقرأ المزيدincludes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. ...
اقرأ المزيدIntroduction to Engineering Statistics and Six Sigma contains precise descriptions of all of the many related methods and ...
اقرأ المزيدINTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
اقرأ المزيدConstitutes the refereed postproceedings of the 11th International Workshop on Job Scheduling Strategies for Parallel Processing, ...
اقرأ المزيدKnowledge Discovery from Legal Databases is the first text to describe data mining , techniques as they apply to law. Law ...
اقرأ المزيدThis volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
اقرأ المزيدMass immunization is the blitzkrieg of vaccination practice. It serves to rapidly protect populations, both because of the ...
اقرأ المزيدLearn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual ...
اقرأ المزيدThe importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and ...
اقرأ المزيدToday, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
اقرأ المزيدThis book explores the impact that professional volunteers have on the low resource countries they choose to spend time in. ...
اقرأ المزيدThis book introduces readers to the background and principles of mobile service computing. It discusses various aspects of ...
اقرأ المزيدMule 2: A Developer's Guide introduces the Mule 2.0 integration platform for developers of enterprise integration applications ...
اقرأ المزيدThe aim of the CEEMAS conference series is to provide a biennial forum for the presentation of multi-agent research and development ...
اقرأ المزيد1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
اقرأ المزيدThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
اقرأ المزيدDense FTTH Passive Optical Networks (PONs) is a cost efficient way to build fibre access, and international standards (G/E-PON) ...
اقرأ المزيدOn April 22, 1915, the German military released 150 tons of chlorine gas at Ypres, Belgium. Carried by a long-awaited wind, ...
اقرأ المزيد