This book constitutes the refereed proceedings of the 8th International Workshop on Intelligent Virtual Agents, IVA 2008, ...
اقرأ المزيدWith blockchain being invented in 2008, cryptocurrencies have grown steadily through the years. Cryptocurrencies continue ...
اقرأ المزيد
Therearealreadymanyexcellentconferencesinthe?eldofNetworkofSystem Management : LISA, IM, NOMS, DSOM, Policy Workshop, etc. ...
اقرأ المزيد
The interaction paradigm provides a new conceptualization of computational phenomena that emphasizes interaction rather than ...
اقرأ المزيد
This book constitutes the refereed proceedings of the First Joint International Conference on Interactive Digital Storytelling, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 15th International Workshop on Design, Specification, and Verification ...
اقرأ المزيد
In Interconnect-centric Design for Advanced SoC and NoC, we have tried to create a comprehensive understanding about on-chip ...
اقرأ المزيد
The motivation of this survey is to review companies’ internationalisation procedures from a logistics perspective. What ...
اقرأ المزيد
WINE 2005, the First Workshop on Internet and Network Economics (WINE 2005), took place in Hong Kong, China, December 15-17, ...
اقرأ المزيد
Explores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
اقرأ المزيد
This book cover a wide range of topics from a technology to a business perspective and include among others hardware, software ...
اقرأ المزيد
Presents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, ...
اقرأ المزيد
A concise reference to the state of the art in software interoperability, Interoperability of Enterprise Software and Applications ...
اقرأ المزيد
Standards play crucial roles in many different aspects of today’s economy. They can define meanings of semantics, product ...
اقرأ المزيد
Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
اقرأ المزيد
“Introduction to Reconfigurable Computing” provides a comprehensive study of the field Reconfigurable Computing. It provides ...
اقرأ المزيد
INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
اقرأ المزيد
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
اقرأ المزيد
This book gathers selected papers presented at the 4th International Conference on Inventive Communication and Computational ...
اقرأ المزيد
The purpose of this book is to present current status of this technology by looking at its application in different domains, ...
اقرأ المزيد