In today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيد
In today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 23rd IFIP WG 6.1 International Conference on Coordination Models and ...
اقرأ المزيد
This book constitutes the proceedings of the 22nd International Conference on Coordination Models and Languages, COORDINATION ...
اقرأ المزيد
The definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...
اقرأ المزيدData is the basis of the digitized economy. Industry 4.0 and digital services produce unprecedented amounts of data and enable ...
اقرأ المزيد
Presents some recent developments in correlated data analysis. It utilizes the class of dispersion models as marginal components ...
اقرأ المزيد
In Cost-Based Oracle Fundamentals, the first book in a series of three, Jonathan Lewis—one of the foremost authorities ...
اقرأ المزيد
It is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...
اقرأ المزيد
It is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...
اقرأ المزيدThis book contains four parts. The first part presents a further development of models of knowledge creation presented already ...
اقرأ المزيد
This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيد
Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
اقرأ المزيد
Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيد
Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيد
This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد