Modern information and communication technologies, together with a cultural upheaval within the research community, have ...
اقرأ المزيد
This volume focuses on the development of a P5 eHealth, or better, a methodological resource for developing the health technologies ...
اقرأ المزيد
This open access book presents fresh ethnographic work from the regions of Africa and Melanesia—where the popularity of ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th IEEE Tutorial and Research Workshop on Perception and Interactive ...
اقرأ المزيدThis book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...
اقرأ المزيد
The ideas and imagery about the future that characterize nanotechnology today are shaped by multiple values and agendas which ...
اقرأ المزيد
Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
اقرأ المزيد
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
اقرأ المزيد
The papers address different development modes, roles in the value chain, stakeholders’ viewpoints, collaborative development, ...
اقرأ المزيد
This book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
اقرأ المزيد
This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيد
This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
اقرأ المزيد
This book analyses the different types of post-execution punishments and other aggravated execution practices, the reasons ...
اقرأ المزيد
The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
اقرأ المزيد
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
اقرأ المزيد
The book addressed span a wide range of problems and solutions associated with the teaching of programming such as introductory ...
اقرأ المزيد
This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and ...
اقرأ المزيد
It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
اقرأ المزيد
This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
اقرأ المزيد