In today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيدIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 23rd IFIP WG 6.1 International Conference on Coordination Models and ...
اقرأ المزيدThis book constitutes the proceedings of the 22nd International Conference on Coordination Models and Languages, COORDINATION ...
اقرأ المزيدThe definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...
اقرأ المزيدData is the basis of the digitized economy. Industry 4.0 and digital services produce unprecedented amounts of data and enable ...
اقرأ المزيدPresents some recent developments in correlated data analysis. It utilizes the class of dispersion models as marginal components ...
اقرأ المزيدIn Cost-Based Oracle Fundamentals, the first book in a series of three, Jonathan Lewis—one of the foremost authorities ...
اقرأ المزيدIt is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...
اقرأ المزيدIt is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...
اقرأ المزيدThis book contains four parts. The first part presents a further development of models of knowledge creation presented already ...
اقرأ المزيدThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيدStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
اقرأ المزيدStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيدIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
اقرأ المزيدThis book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد